Week 7 - Crypto-Graphic Tools
Week 7 - Crypto-Graphic Tools
Lecture 8
Message Authentication
protects against active attacks
verifies received message is authentic
contents unaltered
from authentic source
timely and in correct sequence
can use conventional encryption
only sender & receiver have key needed
or separate authentication mechanisms
append authentication tag to cleartext message
Message Authentication Codes
Secure Hash Functions
Message
Authentication
Hash Function Requirements
applied to any size data
H produces a fixed-length output.
H(x) is relatively easy to compute for any given x
one-way property
computationally infeasible to find x such that H(x) = h
weak collision resistance
computationally infeasible to find y ≠ x such tha H(y) = H(x)
strong collision resistance
computationally infeasible to find any pair (x, y) such that H(x)
= H(y)
Examples of Crypto Hash
Functions
MD4 = Message Digest 4 [RFC 1320] - 32b
operations
MD5 = Message Digest 5 [RFC 1321] - 32b
operations
SHA = Secure hash algorithm [NIST]
SHA-1 = Updated SHA
SHA-2 = SHA-224, SHA-256, SHA-384, SHA-512
SHA-512 uses 64-bit operations
Public Key Authentication
Authentication and/or data integrity
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI): integrated
system of software, encryption methodologies,
protocols, legal agreements, and third-party
services enabling users to communicate
securely
PKI systems based on public key
cryptosystems; include digital certificates and
certificate authorities (CAs)
Public Key Infrastructure
PKIX Management
functions:
registration
initialization
certification
key pair recovery
key pair update
revocation request
cross certification
protocols:
CMP(certificate management protocols ),
CMC(certificate management messages )
PKI services
PKI protects information assets in several ways:
Authentication – Digital Certificate
To identify a user who claim who he/she is, in order to access the
resource.
Non-repudiation – Digital Signature
To make the user becomes unable to deny that he/she has sent the
message, signed the document or participated in a transaction.
Confidentiality - Encryption
To make the transaction secure, no one else is able to read/retrieve
the ongoing transaction unless the communicating parties.
Integrity - Encryption
To ensure the information has not been tampered during transmission.
Authorization. Digital certificates issued in a PKI environment
can replace user IDs and passwords, enhance security, and reduce
some of the overhead required for authorization processes and
controlling access privileges
Digital Signatures
Encrypted messages that can be
mathematically proven to be authentic
Created in response to rising need to verify
information transferred using electronic
systems
Asymmetric encryption processes used to
create digital signatures
Digital Signature
Digital signature can be used in all electronic
communications
Web, e-mail, e-commerce
It is an electronic stamp or seal that append to
the document.
Ensure the document being unchanged during
transmission.
User B received
Verify the signature the document with
by A’s public key stored signature attached
at the directory
User B
Message Message
Reference