Message Authentication

Message Authentication
Prof. Neeraj Bhargava
Kapil Chauhan
Department of Computer Science
School of Engineering & Systems Sciences
MDS University, Ajmer
Message Authentication
message authentication is concerned with:
protecting the integrity of a message
validating identity of originator
non-repudiation of origin (dispute resolution)
will consider the security requirements
then three alternative functions used:
message encryption
message authentication code (MAC)
hash function
Security Requirements
disclosure
traffic analysis
masquerade
content modification
sequence modification
timing modification
source repudiation
destination repudiation
Message Encryption
message encryption by itself also provides a measure
of authentication
if symmetric encryption is used then:
receiver know sender must have created it
since only sender and receiver now key used
know content cannot of been altered
if message has suitable structure, redundancy or a
checksum to detect any changes
Message Encryption
if public-key encryption is used:
encryption provides no confidence of sender
since anyone potentially knows public-key
however if
 sender signs message using their private-key
 then encrypts with recipients public key
 have both secrecy and authentication
again need to recognize corrupted messages
but at cost of two public-key uses on message
Message Authentication Code (MAC)
generated by an algorithm that creates a small fixed-
sized block
depending on both message and some key
like encryption though need not be reversible
appended to message as a signature
receiver performs same computation on message and
checks it matches the MAC
provides assurance that message is unaltered and
comes from sender
Message Authentication Code
Message Authentication Codes
as shown the MAC provides confidentiality
can also use encryption for secrecy
generally use separate keys for each
can compute MAC either before or after encryption
is generally regarded as better done before
why use a MAC?
sometimes only authentication is needed
sometimes need authentication to persist longer than
the encryption (eg. archival use)
note that a MAC is not a digital signature
MAC Properties
a MAC is a cryptographic checksum
MAC = CK(M)
condenses a variable-length message M
using a secret key K
to a fixed-sized authenticator
is a many-to-one function
potentially many messages have same MAC
but finding these needs to be very difficult
Requirements for MACs
 taking into account the types of attacks
 need the MAC to satisfy the following:
1. knowing a message and MAC, is infeasible to find
another message with same MAC
2. MACs should be uniformly distributed
3. MAC should depend equally on all bits of the
message
Using Symmetric Ciphers for MACs
can use any block cipher chaining mode and use final
block as a MAC
Data Authentication Algorithm (DAA) is a widely
used MAC based on DES-CBC
using IV=0 and zero-pad of final block
encrypt message using DES in CBC mode
and send just the final block as the MAC
 or the leftmost M bits (16≤M≤64) of final block
but final MAC is now too small for security
Hash Functions
condenses arbitrary message to fixed size
usually assume that the hash function is public and
not keyed
cf. MAC which is keyed
hash used to detect changes to message
can use in various ways with message
most often to create a digital signature
Hash Functions & Digital Signatures
Hash Function Properties
a Hash Function produces a fingerprint of some
file/message/data
h = H(M)
condenses a variable-length message M
to a fixed-sized fingerprint
assumed to be public
Requirements for Hash Functions
1. can be applied to any sized message M
2. produces fixed-length output h
3. is easy to compute h=H(M) for any message M
4. given h is infeasible to find x s.t. H(x)=h
• one-way property
1. given x is infeasible to find y s.t. H(y)=H(x)
• weak collision resistance
1. is infeasible to find any x,y s.t. H(y)=H(x)
• strong collision resistance
Simple Hash Functions
are several proposals for simple functions
based on XOR of message blocks
not secure since can manipulate any message and
either not change hash or change hash also
need a stronger cryptographic function (next chapter)
Block Ciphers as Hash Functionscan use block ciphers as hash functions
using H0=0 and zero-pad of final block
compute: Hi = EMi
[Hi-1]
and use final block as the hash value
similar to CBC but without a key
resulting hash is too small (64-bit)
both due to direct birthday attack
and to “meet-in-the-middle” attack
other variants also susceptible to attack
Hash Functions & MAC Security
like block ciphers have:
brute-force attacks exploiting
strong collision resistance hash have cost 2
m/2
 have proposal for h/w MD5 cracker
 128-bit hash looks vulnerable, 160-bits better
MACs with known message-MAC pairs
 can either attack keyspace (cf key search) or MAC
 at least 128-bit MAC is needed for security
Hash Functions & MAC Security
cryptanalytic attacks exploit structure
like block ciphers want brute-force attacks to be the
best alternative
have a number of analytic attacks on iterated hash
functions
CVi = f[CVi-1, Mi]; H(M)=CVN
typically focus on collisions in function f
like block ciphers is often composed of rounds
attacks exploit properties of round functions
Summary
have considered:
message authentication using
message encryption
MACs
hash functions
general approach & security
1 von 20

Recomendados

MAC-Message Authentication Codes von
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
4.7K views38 Folien
Message authentication von
Message authenticationMessage authentication
Message authenticationCAS
26.3K views22 Folien
Message Authentication Code & HMAC von
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
16.4K views20 Folien
5. message authentication and hash function von
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash functionChirag Patel
17.2K views30 Folien
CRYPTOGRAPHY & NETWORK SECURITY - unit 1 von
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1RAMESHBABU311293
1K views53 Folien
S/MIME von
S/MIMES/MIME
S/MIMEmaria azam
14.8K views9 Folien

Más contenido relacionado

Was ist angesagt?

Message digest 5 von
Message digest 5Message digest 5
Message digest 5Tirthika Bandi
6.2K views20 Folien
Hash Function von
Hash FunctionHash Function
Hash FunctionSiddharth Srivastava
24.2K views32 Folien
Message Authentication von
Message AuthenticationMessage Authentication
Message AuthenticationRam Dutt Shukla
6.5K views30 Folien
IP Security von
IP SecurityIP Security
IP SecurityKeshab Nath
51.4K views55 Folien
Message authentication and hash function von
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash functionomarShiekh1
284 views38 Folien
Public Key Cryptosystem von
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
16.5K views19 Folien

Was ist angesagt?(20)

Message authentication and hash function von omarShiekh1
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
omarShiekh1284 views
Public Key Cryptosystem von Devakumar Kp
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp16.5K views
Cs8792 cns - unit iv von ArthyR3
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
ArthyR3570 views
Cryptography and network security von patisa
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa42.7K views
Diffie hellman key exchange algorithm von Sunita Kharayat
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat1.5K views
Key management and distribution von Riya Choudhary
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary16.4K views
Pgp pretty good privacy von Pawan Arya
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya69.8K views
Digital signature schemes von ravik09783
Digital signature schemesDigital signature schemes
Digital signature schemes
ravik097836.4K views
BAIT1103 Chapter 6 von limsh
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
limsh1.4K views

Similar a Message Authentication

Ch11 von
Ch11Ch11
Ch11Joe Christensen
683 views22 Folien
ch11.ppt von
ch11.pptch11.ppt
ch11.pptSomuPatil8
8 views22 Folien
Cryptography and network_security von
Cryptography and network_securityCryptography and network_security
Cryptography and network_securityJanani Satheshkumar
76 views30 Folien
Cs8792 cns - unit iv von
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit ivArthyR3
118 views153 Folien
Cns von
CnsCns
CnsArthyR3
172 views145 Folien
Information and data security cryptography and network security von
Information and data security cryptography and network securityInformation and data security cryptography and network security
Information and data security cryptography and network securityMazin Alwaaly
399 views33 Folien

Similar a Message Authentication(20)

Cs8792 cns - unit iv von ArthyR3
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
ArthyR3118 views
Cns von ArthyR3
CnsCns
Cns
ArthyR3172 views
Information and data security cryptography and network security von Mazin Alwaaly
Information and data security cryptography and network securityInformation and data security cryptography and network security
Information and data security cryptography and network security
Mazin Alwaaly399 views
Message Authentication Requirement-MAC von Sou Jana
Message Authentication Requirement-MACMessage Authentication Requirement-MAC
Message Authentication Requirement-MAC
Sou Jana135 views
Information and network security 42 security of message authentication code von Vaibhav Khanna
Information and network security 42 security of message authentication codeInformation and network security 42 security of message authentication code
Information and network security 42 security of message authentication code
Vaibhav Khanna80 views
unit - III.pptx von sandyBS
unit - III.pptxunit - III.pptx
unit - III.pptx
sandyBS5 views
Message Authentication and Hash Function.pdf von sunil sharma
Message Authentication and Hash Function.pdfMessage Authentication and Hash Function.pdf
Message Authentication and Hash Function.pdf
sunil sharma41 views
Cryptography and Message Authentication NS3 von koolkampus
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus6K views
MACs based on Hash Functions, MACs based on Block Ciphers von Maitree Patel
MACs based on Hash Functions, MACs based on Block CiphersMACs based on Hash Functions, MACs based on Block Ciphers
MACs based on Hash Functions, MACs based on Block Ciphers
Maitree Patel2.4K views
Message authentication between the nodes von Selva Raj
Message authentication between the nodesMessage authentication between the nodes
Message authentication between the nodes
Selva Raj49 views
Is unit 5_message authentication and hash functions von Sarthak Patel
Is unit 5_message authentication and hash functionsIs unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functions
Sarthak Patel2.6K views
A Modified approach for implementation of an efficient padding scheme in a di... von dannyijwest
A Modified approach for implementation of an efficient padding scheme in a di...A Modified approach for implementation of an efficient padding scheme in a di...
A Modified approach for implementation of an efficient padding scheme in a di...
dannyijwest67 views
Meessage authentication and hash functions.pptx von JohnLagman3
Meessage authentication and hash functions.pptxMeessage authentication and hash functions.pptx
Meessage authentication and hash functions.pptx
JohnLagman315 views

Más de chauhankapil

Gray level transformation von
Gray level transformationGray level transformation
Gray level transformationchauhankapil
767 views9 Folien
Elements of visual perception von
Elements of visual perceptionElements of visual perception
Elements of visual perceptionchauhankapil
184 views8 Folien
JSP Client Request von
JSP Client RequestJSP Client Request
JSP Client Requestchauhankapil
454 views10 Folien
Jsp server response von
Jsp   server responseJsp   server response
Jsp server responsechauhankapil
76 views9 Folien
Markov decision process von
Markov decision processMarkov decision process
Markov decision processchauhankapil
331 views8 Folien
RNN basics in deep learning von
RNN basics in deep learningRNN basics in deep learning
RNN basics in deep learningchauhankapil
91 views10 Folien

Más de chauhankapil(20)

Gray level transformation von chauhankapil
Gray level transformationGray level transformation
Gray level transformation
chauhankapil767 views
Elements of visual perception von chauhankapil
Elements of visual perceptionElements of visual perception
Elements of visual perception
chauhankapil184 views
Markov decision process von chauhankapil
Markov decision processMarkov decision process
Markov decision process
chauhankapil331 views
RNN basics in deep learning von chauhankapil
RNN basics in deep learningRNN basics in deep learning
RNN basics in deep learning
chauhankapil91 views
Introduction to generative adversarial networks (GANs) von chauhankapil
Introduction to generative adversarial networks (GANs)Introduction to generative adversarial networks (GANs)
Introduction to generative adversarial networks (GANs)
chauhankapil55 views
Bayesian probabilistic interference von chauhankapil
Bayesian probabilistic interferenceBayesian probabilistic interference
Bayesian probabilistic interference
chauhankapil39 views
Exception handling in java von chauhankapil
Exception handling in javaException handling in java
Exception handling in java
chauhankapil115 views
Knowledge based system von chauhankapil
Knowledge based systemKnowledge based system
Knowledge based system
chauhankapil479 views
Introduction of predicate logics von chauhankapil
Introduction of predicate  logicsIntroduction of predicate  logics
Introduction of predicate logics
chauhankapil84 views
Types of inheritance in java von chauhankapil
Types of inheritance in javaTypes of inheritance in java
Types of inheritance in java
chauhankapil82 views
Representation of syntax, semantics and Predicate logics von chauhankapil
Representation of syntax, semantics and Predicate logicsRepresentation of syntax, semantics and Predicate logics
Representation of syntax, semantics and Predicate logics
chauhankapil209 views

Último

Update 42 models(Diode/General ) in SPICE PARK(DEC2023) von
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Tsuyoshi Horigome
33 views16 Folien
SUMIT SQL PROJECT SUPERSTORE 1.pptx von
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptxSumit Jadhav
15 views26 Folien
Control Systems Feedback.pdf von
Control Systems Feedback.pdfControl Systems Feedback.pdf
Control Systems Feedback.pdfLGGaming5
6 views39 Folien
K8S Roadmap.pdf von
K8S Roadmap.pdfK8S Roadmap.pdf
K8S Roadmap.pdfMaryamTavakkoli2
8 views1 Folie
GDSC Mikroskil Members Onboarding 2023.pdf von
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdfgdscmikroskil
53 views62 Folien
MSA Website Slideshow (16).pdf von
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdfmsaucla
76 views8 Folien

Último(20)

Update 42 models(Diode/General ) in SPICE PARK(DEC2023) von Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
SUMIT SQL PROJECT SUPERSTORE 1.pptx von Sumit Jadhav
SUMIT SQL PROJECT SUPERSTORE 1.pptxSUMIT SQL PROJECT SUPERSTORE 1.pptx
SUMIT SQL PROJECT SUPERSTORE 1.pptx
Sumit Jadhav 15 views
Control Systems Feedback.pdf von LGGaming5
Control Systems Feedback.pdfControl Systems Feedback.pdf
Control Systems Feedback.pdf
LGGaming56 views
GDSC Mikroskil Members Onboarding 2023.pdf von gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdfGDSC Mikroskil Members Onboarding 2023.pdf
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil53 views
MSA Website Slideshow (16).pdf von msaucla
MSA Website Slideshow (16).pdfMSA Website Slideshow (16).pdf
MSA Website Slideshow (16).pdf
msaucla76 views
Design of machine elements-UNIT 3.pptx von gopinathcreddy
Design of machine elements-UNIT 3.pptxDesign of machine elements-UNIT 3.pptx
Design of machine elements-UNIT 3.pptx
gopinathcreddy32 views
_MAKRIADI-FOTEINI_diploma thesis.pptx von fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx_MAKRIADI-FOTEINI_diploma thesis.pptx
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi8 views
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ... von AltinKaradagli
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
Investigation of Physicochemical Changes of Soft Clay around Deep Geopolymer ...
AltinKaradagli12 views
Introduction to CAD-CAM.pptx von suyogpatil49
Introduction to CAD-CAM.pptxIntroduction to CAD-CAM.pptx
Introduction to CAD-CAM.pptx
suyogpatil495 views
fakenews_DBDA_Mar23.pptx von deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra815 views

Message Authentication

  • 1. Message Authentication Prof. Neeraj Bhargava Kapil Chauhan Department of Computer Science School of Engineering & Systems Sciences MDS University, Ajmer
  • 2. Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the security requirements then three alternative functions used: message encryption message authentication code (MAC) hash function
  • 3. Security Requirements disclosure traffic analysis masquerade content modification sequence modification timing modification source repudiation destination repudiation
  • 4. Message Encryption message encryption by itself also provides a measure of authentication if symmetric encryption is used then: receiver know sender must have created it since only sender and receiver now key used know content cannot of been altered if message has suitable structure, redundancy or a checksum to detect any changes
  • 5. Message Encryption if public-key encryption is used: encryption provides no confidence of sender since anyone potentially knows public-key however if  sender signs message using their private-key  then encrypts with recipients public key  have both secrecy and authentication again need to recognize corrupted messages but at cost of two public-key uses on message
  • 6. Message Authentication Code (MAC) generated by an algorithm that creates a small fixed- sized block depending on both message and some key like encryption though need not be reversible appended to message as a signature receiver performs same computation on message and checks it matches the MAC provides assurance that message is unaltered and comes from sender
  • 8. Message Authentication Codes as shown the MAC provides confidentiality can also use encryption for secrecy generally use separate keys for each can compute MAC either before or after encryption is generally regarded as better done before why use a MAC? sometimes only authentication is needed sometimes need authentication to persist longer than the encryption (eg. archival use) note that a MAC is not a digital signature
  • 9. MAC Properties a MAC is a cryptographic checksum MAC = CK(M) condenses a variable-length message M using a secret key K to a fixed-sized authenticator is a many-to-one function potentially many messages have same MAC but finding these needs to be very difficult
  • 10. Requirements for MACs  taking into account the types of attacks  need the MAC to satisfy the following: 1. knowing a message and MAC, is infeasible to find another message with same MAC 2. MACs should be uniformly distributed 3. MAC should depend equally on all bits of the message
  • 11. Using Symmetric Ciphers for MACs can use any block cipher chaining mode and use final block as a MAC Data Authentication Algorithm (DAA) is a widely used MAC based on DES-CBC using IV=0 and zero-pad of final block encrypt message using DES in CBC mode and send just the final block as the MAC  or the leftmost M bits (16≤M≤64) of final block but final MAC is now too small for security
  • 12. Hash Functions condenses arbitrary message to fixed size usually assume that the hash function is public and not keyed cf. MAC which is keyed hash used to detect changes to message can use in various ways with message most often to create a digital signature
  • 13. Hash Functions & Digital Signatures
  • 14. Hash Function Properties a Hash Function produces a fingerprint of some file/message/data h = H(M) condenses a variable-length message M to a fixed-sized fingerprint assumed to be public
  • 15. Requirements for Hash Functions 1. can be applied to any sized message M 2. produces fixed-length output h 3. is easy to compute h=H(M) for any message M 4. given h is infeasible to find x s.t. H(x)=h • one-way property 1. given x is infeasible to find y s.t. H(y)=H(x) • weak collision resistance 1. is infeasible to find any x,y s.t. H(y)=H(x) • strong collision resistance
  • 16. Simple Hash Functions are several proposals for simple functions based on XOR of message blocks not secure since can manipulate any message and either not change hash or change hash also need a stronger cryptographic function (next chapter)
  • 17. Block Ciphers as Hash Functionscan use block ciphers as hash functions using H0=0 and zero-pad of final block compute: Hi = EMi [Hi-1] and use final block as the hash value similar to CBC but without a key resulting hash is too small (64-bit) both due to direct birthday attack and to “meet-in-the-middle” attack other variants also susceptible to attack
  • 18. Hash Functions & MAC Security like block ciphers have: brute-force attacks exploiting strong collision resistance hash have cost 2 m/2  have proposal for h/w MD5 cracker  128-bit hash looks vulnerable, 160-bits better MACs with known message-MAC pairs  can either attack keyspace (cf key search) or MAC  at least 128-bit MAC is needed for security
  • 19. Hash Functions & MAC Security cryptanalytic attacks exploit structure like block ciphers want brute-force attacks to be the best alternative have a number of analytic attacks on iterated hash functions CVi = f[CVi-1, Mi]; H(M)=CVN typically focus on collisions in function f like block ciphers is often composed of rounds attacks exploit properties of round functions
  • 20. Summary have considered: message authentication using message encryption MACs hash functions general approach & security

Hinweis der Redaktion

  1. Up till now, have been concerned with protecting message content (ie secrecy) by encrypting the message. Will now consider how to protect message integrity (ie protection from modification), as well as confirming the identity of the sender. Generically this is the problem of message authentication, and in eCommerce applications is arguably more important than secrecy.
  2. The first two requirements belong in the realm of message confidentiality, and are handled using the encryption techniques already discussed. The remaining requirements belong in the realm of message authentication. At its core this addresses the issue of ensuring that a message comes from the alleged source and has not been altered. It may also address sequencing and timeliness. The use of a digital signature can also address issues of repudiation.
  3. Can also use block cipher chaining modes to create a separate authenticator, by just sending the last block. However this suffers from being a bit too small for acceptable use today.
  4. These are the specifications for good hash functions. Essentially it must be extremely difficult to find 2 messages with the same hash, and the hash should not be related to the message in any obvious way (ie it should be a complex non-linear function of the message). There are quite a few similarities in the evolution of hash functions & block ciphers, and in the evolution of the design requirements on both.