BAIT2023 Introduction To Internet Security: Tutorial 3
BAIT2023 Introduction To Internet Security: Tutorial 3
to Internet Security
Tutorial 3
1. What properties must a hash function have to be useful for
message authentication?
Purposes:
• Intended to provide proof of data integrity, by providing a
verifiable fingerprint of the data.
Example:
• Unix password: Hash user password and store into database.
• Integrity of downloaded file: Use hash value to determine
the integrity of downloaded file.
7. Figure 1 below shows the process of a message transmitting from
a sender to a receiver by using the security of Message Authentication.
i. Name the component A, B, K as stated in Figure 1
C: Comparing process
Receiver will compare both original MAC (Message
Authentication Code) with the MAC (Message Authentication
Code) embedded in the message. If both MAC are same, the
message is valid and not edited by intruders, whereas if the
MAC is not same, the message is invalid and edited by
intruders.
iii. With the aid of Figure 1, briefly describe the steps of the Message
Authentication process from the sender to the receiver.
• X: RSA algorithm
iv. Briefly describe FIVE (5) examples that use public-key cryptography in the Internet
environment.
• Examples:
• Digital Cheque
• Contract document
• Credit card payment
• Any confidential email or document. (e.g Government
• documents/Court documents/ Police investigation
documents,etc)
• Digital signature