L-2.5 Authentication Requirements
L-2.5 Authentication Requirements
Authentication Requirements
Authentication Requirements
Message authentication
Message authentication is a procedure to verify that
received messages come from
the alleged source and have not been altered. Message
authentication may also verify
sequencing and timeliness. A digital signature is an
authentication technique that also includes measures to
counter repudiation by either source or destination.
Hash Functions
Hash Functions…….
A cryptographic hash function is an algorithm for which it is
computationally infeasible to find either
Two data objects that map to the same hash result (The
collision-free property).
Message Authentication
When confidentiality is not required, method (b) takes less computation time
as compared to methods (a) and (d).
Digital Signatures
Anyone who knows the user’s public key can verify the
integrity of the message that is associated with the digital
signature.
Other Applications
References
• http://www.brainkart.com/article/Classical-Encryption-
Techniques_8339/
• https://www.tutorialspoint.com/cryptography/index.ht
m
• https://www.geeksforgeeks.org/cryptography-introducti
on/
• https://www.techopedia.com/definition/1770/cryptogr
aphy#:~:text=Cryptography%20involves%20creating%2
0written%20or,information%20to%20be%20kept%20s
ecret.&text=Information%20security%20uses%20crypto
graphy%20on,transit%20and%20while%20being%20st
ored
.
• https://www2.slideshare.net/lineking/classical-encrypti
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
E- Books Recommended
• https://www.pdfdrive.com/cyber-security-books.html
• https://bookauthority.org/books/new-cyber-security-eb
ooks
• https://bookauthority.org/books/best-cyber-security-eb
ooks
• https://www.freetechbooks.com/information-security-f5
2.html