Unit 4
Unit 4
• Authentication Requirements
• Authentication Functions
• Message Authentication Codes
• Hash Functions
• Security of Hash Functions and MACs
Authentication Requirements
Disclosure:
Release of message contents to any person or process not possessing the appropriate
cryptographic key
Traffic analysis:
Discovery of the pattern of traffic between parties
frequency and duration of connections
number and length of messages between parties
Masquerade:
fraudulent acknowledgments of message receipt or nonreceipt
Insertion of messages into the network from a fraudulent source
Authentication Requirements…
Content modification:
Changes to the contents of a message, including insertion, deletion,
transposition, and modification
Sequence modification:
Any modification to a sequence of messages between parties, including
insertion, deletion, and reordering
Timing modification:
Delay or replay of messages
Authentication Requirements…
Source repudiation:
Denial of transmission of message by source
Destination repudiation:
Denial of receipt of message by destination
Authentication Requirements …
• Disclosure Message Confidentiality
• Traffic analysis
• Masquerade
• Content Modification Message Authentication
• Sequence modification
• Timing modification
• Source repudiation Digital Signature
• Destination repudiation
Message Authentication
verify received messages come from the alleged source (unaltered)
verify sequencing and timeliness
Digital Signature
authentication technique
counter repudiation by the source
Authentication Functions
Two levels of functionality:
function that produces an authenticator (low level)
verify the authenticity of a message (high level)
Authentication Functions …
• Message encryption
M + MAC is transmitted
Only A and B share K
Provides authentication: Only A and B share K1
NOTE: MAC does not provide a digital signature (sender and receiver share the same key)
Message Authentication Code ! Why
?
Scenario 1: Same message is broadcast to number of destinations
Authentication + signature
confidentiality + digital signature
Hash Function : Requirements
• H can be applied to a block of data of any size
• H produces a fixed-length output
• H(x) is relatively easy to compute for any given x, making both hardware
and software implementations practical
• For any given value h, it is computationally infeasible to find x such that
H(x) = h (one-way property)
• For any given block x, it is computationally infeasible to find y != x such
that H(y) = H(x) (weak collision resistance)
• It is computationally infeasible to find any pair (x, y) such that H(x) =
H(y) (strong collision resistance)
Hash Function : Requirements
Relationship among properties
Properties for various hash
function apps
Security : BRUTE FORCE ATTACK
(|M| + |P| + 128) = 0 mod 1024 → |P| = (− |M| − 128) mod 1024
SHA- 512 : Length Field and Padding
What is the number of padding bits if the length of the original message
is 2590 bits?
• values are calculated from the first eight prime numbers (2, 3, 5, 7, 11,
13, 17, and 19)
• square root (19)^1/2 = 4.35889894354
SHA- 512
:
Compres
sion
Function
SHA- 512: Structure of each round …
• Conditional Function
• Rotate Function
SHA- 512: Majority Function
Example : Majority function on buffers A, B, and C
• If the leftmost hexadecimal digits of these buffers are 0x7, 0xA, and 0xE,
respectively, what is the leftmost digit of the result?