CH - 11 Integrity Auth
CH - 11 Integrity Auth
Message Integrity
and
Message Authentication
11.1
Chapter 11
Objectives
11.2
11-1 MESSAGE INTEGRITY
11.4
11.1.2 Message and Message Digest
11.5
11.1.3 Difference
Note
The message digest needs to be safe from change.
11.6
hash function
11.7
Simple Hash Functions
are several proposals for simple
functions
based on XOR of message blocks
11.8
11.1.4 Checking Integrity
11.9
11.1.5 Cryptographic Hash Function Criteria
11.10
11.1.5 Continued
Preimage Resistance
11.11
11.1.5 Continued
Example 11.1
Can we use a conventional lossless compression method such as
StuffIt as a cryptographic hash function?
Solution
We cannot. A lossless compression method creates a compressed
message that is reversible.
Example 11.2
Can we use a checksum function as a cryptographic hash
function?
Solution
We cannot. A checksum function is not preimage resistant, Eve
may find several messages whose checksum matches the given
one.
11.12
11.1.5 Second Preimage Resistance
Ensures that a message can not easily be forged
Collision Resistance
outputdiscussed
Topics domain. in this section:
11.2.1 Pigeonhole Principle
11.2.2 Birthday Problems
11.2.3 Attacks on Random Oracle Model
11.2.4 Attacks on the Structure
11.15
11-2 Continued
Example 11.3
11.17
11-2 Continued
Example 11.4
11.18
11.2.1 Pigeonhole Principle
11.19
birthday problem
11.20
11.2.2 Continued
Comparison
Figure 11.8 Graph of four birthday problem
11.21
11.2.3 Continued
Example 11.6
A cryptographic hash function uses a digest of 64 bits. How many
digests does Eve need to create to find the original message with
the probability more than 0.5?
Solution
The number of digests to be created is k ≈ 0.69 × 2n ≈ 0.69 × 264.
This is a large number. Even if Eve can create 230 (almost one
billion) messages per second, it takes 0.69 × 234 seconds or more
than 500 years. This means that a message digest of size 64 bits is
secure with respect to preimage attack, but, as we will see shortly,
is not secured to collision attack.
11.22
11.2.3 Continued
Example 11.7
A cryptographic hash function uses a digest of 64 bits. How many
digests does Eve need to create to find two messages with the same
digest with the probability more than 0.5?
Solution
The number of digests to be created is k ≈ 1.18 × 2 n/2 ≈ 1.18 × 232.
If Eve can test 220 (almost one million) messages per second, it
takes 1.18 × 212 seconds, or less than two hours. This means that a
message digest of size 64 bits is not secure against the collision
attack.
11.23
11-3 MESSAGE AUTHENTICATION
11.24
11.3.1 Modification Detection Code (MDC)
11.26
11.3.2 Message Authentication Code (MAC)
MAC includes a shared secret key.
11.27
11.3.2 Continued
Note
The security of a MAC depends on the security of
the underlying hash algorithm.
11.28
11.3.2 Continued
Nested MAC
Figure 11.11 Nested MAC
11.29
HMAC
Figure 11.12
Details of
Hashed MAC
11.30
HMAC uses the following parameters:
11.34