SlideShare a Scribd company logo
4
Most read
5
Most read
6
Most read
COMPUTER SECURITY
MESSAGE AUTHENTICATION
Mr. RAJASEKAR RAMALINGAM
Faculty - Department of IT
College of Applied Sciences – Sur,
Sultanate of Oman.
vrrsekar@yahoo.com
CONTENT
1. MESSAGE SECURITY REQUIREMENTS
2. MESSAGE AUTHENTICATION
3. MESSAGE ENCRYPTION
4. HASH FUNCTIONS
5. MESSAGE AUTHENTICATION CODE (MAC)
6. HMAC
2MESSAGE AUTHENTICATION
1. MESSAGE SECURITY REQUIREMENTS
• In communications from a computer to computer, the following
attacks could be identified:
• Disclosure: Release of message contents
• Traffic analysis: Discovery of the pattern of traffic between parties
• Masquerade: Insertion of messages into the network from a
fraudulent source
• Content modification: Modification of the contents of a message
• Sequence modification: Modification to a sequence of messages
between parties
• Timing modification: Delay or replay of messages
• Source repudiation: Denial of transmission of message by source
• Destination repudiation: Denial of receipt of message by destination
3MESSAGE AUTHENTICATION
2. MESSAGE AUTHENTICATION
• Message authentication is concerned with:
• Protecting the integrity of a message
• Validating identity of originator
• Non-repudiation of origin (dispute resolution)
• Will consider the security requirements
• Three alternative functions used:
• Message encryption
• Hash functions
• Message Authentication Code (MAC)
4MESSAGE AUTHENTICATION
3. MESSAGE ENCRYPTION
3.1 SYMMETRIC MESSAGE ENCRYPTION
• Encryption can also provides authentication
• If symmetric encryption is used then:
• Receiver know sender must have created it
• Since only sender and receiver now key used
• Know content cannot of been altered
• If message has suitable structure, redundancy or a checksum to
detect any changes
5MESSAGE AUTHENTICATION
3.2 PUBLIC-KEY MESSAGE ENCRYPTION
• If public-key encryption is used:
• Encryption provides no confidence of sender
• Since anyone potentially knows public-key
However if
• Sender signs message using their private-key
• Then encrypts with recipients public key
• Have both secrecy and authentication
• Again need to recognize corrupted messages
• But at cost of two public-key uses on message
6MESSAGE AUTHENTICATION
4. HASH FUNCTIONS
Condenses arbitrary message to fixed size
h = H(M)
Usually assume hash function is public
Hash used to detect changes to message
Want a cryptographic hash function
Computationally infeasible to find data mapping to specific
hash (one-way property)
Computationally infeasible to find two data to same hash
(collision-free property)
7MESSAGE AUTHENTICATION
4.1 CRYPTOGRAPHIC HASH FUNCTION
• Figure depicts the general operation
of a cryptographic hash function.
• The input is padded out to an integer
multiple of some fixed length (e.g.,
1024 bits) and the padding includes
the value of the length of the original
message in bits.
• The length field is a security
measure to increase the difficulty for
an attacker to produce an alternative
message with the same hash value.
8MESSAGE AUTHENTICATION
4.2 HASH FUNCTIONS & MESSAGE AUTHENTICATION
• Message authentication is a mechanism or service used to verify
the integrity of a message, by assuring that the data received are
exactly as sent.
• Figure A, B, C and D illustrates a variety of ways in which a
hash code can be used to provide message authentication, as
follows:
9MESSAGE AUTHENTICATION
• The message plus concatenated hash code is encrypted using
symmetric encryption. Since only A and B share the secret key,
the message must have come from A and has not been altered.
• The hash code provides the structure or redundancy required to
achieve authentication.
A
10MESSAGE AUTHENTICATION
• Only the hash code is encrypted, using symmetric encryption. This
reduces the processing burden for those applications not requiring
confidentiality.
B
11MESSAGE AUTHENTICATION
C
• Shows the use of a hash function but no encryption for message authentication.
• The technique assumes that the two communicating parties share a common
secret value S.
• A computes the hash value over the concatenation of M and S and appends the
resulting hash value to M.
• Because B possesses S, it can re-compute the hash value to verify.
• Because the secret value itself is not sent, an opponent cannot modify an
intercepted message and cannot generate a false message.
12MESSAGE AUTHENTICATION
• Confidentiality can be added to the approach of (c) by encrypting
the entire message plus the hash code.
D
13MESSAGE AUTHENTICATION
5. MESSAGE AUTHENTICATION CODE (MAC)
• Generated by an algorithm that creates a small fixed-sized block
• Depending on both message and some key
• Like encryption though need not be reversible
• Appended to message as a signature
• Receiver performs same computation on message and checks it
matches the MAC
• Provides assurance that message is unaltered and comes from
sender
14MESSAGE AUTHENTICATION
Message Authentication Code…
• A small fixed-sized block of data
• Generated from message + secret key
• MAC = C(K,M)
• Appended to message when sent
15MESSAGE AUTHENTICATION
5.1 MESSAGE AUTHENTICATION CODES
• As shown the MAC provides authentication
• Why use a MAC?
• sometimes only authentication is needed
• sometimes need authentication to persist longer than the
encryption (eg. archival use)
• Can also use encryption for secrecy
• generally use separate keys for each
• can compute MAC either before or after encryption
• is generally regarded as better done before
16MESSAGE AUTHENTICATION
5.2 MAC PROPERTIES
• A MAC is a cryptographic checksum
MAC = CK(M)
• condenses a variable-length message M
• using a secret key K
• to a fixed-sized authenticator
• Is a many-to-one function
• potentially many messages have same MAC
• but finding these needs to be very difficult
17MESSAGE AUTHENTICATION
6. HMAC
6.1 HMAC DESIGN OBJECTIVES
Use, without modifications, hash functions
Allow for easy re-placeability of embedded hash function
Preserve original performance of hash function without significant
degradation
Use and handle keys in a simple way.
Have well understood cryptographic analysis of authentication
mechanism strength
18MESSAGE AUTHENTICATION
HMAC…
• Uses hash function on the message:
HMACK(M)= Hash[(K+
XOR opad) ||
Hash[(K+
XOR ipad) || M)] ]
• where K+
is the key padded out to
size
• opad, ipad are specified padding
constants
• Overhead is just 3 more hash
calculations than the message needs
alone
• Any hash function can be used
• eg. MD5, SHA-1, RIPEMD-160,
Whirlpool
19MESSAGE AUTHENTICATION
HMAC Overview
Figure Illustrates the overall operation of HMAC:
HMACK = Hash[(K+
XOR opad) || Hash[(K+
XOR ipad) || M)]
where:
K+
is K padded with zeros on the left so that the result is b bits in length
ipad is a pad value of 36 hex repeated to fill block
opad is a pad value of 5C hex repeated to fill block
M is the message input to HMAC (including the padding specified in the embedded
hash function)
Note that the XOR with ipad results in flipping one-half of the bits of K. Similarly,
the XOR with opad results in flipping one-half of the bits of K, but a different set of
bits.
In effect, pseudo randomly generated two keys from K.MESSAGE AUTHENTICATION 20
• HMAC should execute in approximately the same time as the embedded
hash function for long messages.
• HMAC adds three executions of the hash compression function (for Si, So,
and the block produced from the inner hash).
• A more efficient implementation is possible by precomputing the internal
hash function on (K+
XOR opad) and (K+
XOR ipad) and inserting the
results into the hash processing at start & end.
• With this implementation, only one additional instance of the compression
function is added to the processing normally produced by the hash
function.
• This is especially worthwhile if most of the messages for which a MAC is
computed are short.
21MESSAGE AUTHENTICATION
6.2 HMAC SECURITY
• Proved security of HMAC relates to that of the underlying hash
algorithm
• Attacking HMAC requires either:
• Brute force attack on key used
• Birthday attack (but since keyed would need to observe a very large
number of messages)
• Choose hash function used based on speed verses security
constraints
MESSAGE AUTHENTICATION 22

More Related Content

PPT
Message Authentication
chauhankapil
 
PPTX
Hash Function
ssuserdfb2da
 
PDF
Cs8792 cns - unit iv
ArthyR3
 
PPTX
Surface mount Devices(SMD)
shyamaliamale
 
PPTX
Information Security (Digital Signatures)
Zara Nawaz
 
PPTX
Lightweight cryptography
Shivam Singh
 
PPTX
Feasibility study
Prof.Nilesh Magar
 
PPTX
MAC-Message Authentication Codes
DarshanPatil82
 
Message Authentication
chauhankapil
 
Hash Function
ssuserdfb2da
 
Cs8792 cns - unit iv
ArthyR3
 
Surface mount Devices(SMD)
shyamaliamale
 
Information Security (Digital Signatures)
Zara Nawaz
 
Lightweight cryptography
Shivam Singh
 
Feasibility study
Prof.Nilesh Magar
 
MAC-Message Authentication Codes
DarshanPatil82
 

What's hot (20)

PPTX
Public Key Cryptography
Gopal Sakarkar
 
PPT
block ciphers
Asad Ali
 
PDF
Web Security
Dr.Florence Dayana
 
PDF
RSA ALGORITHM
Dr. Shashank Shetty
 
PPTX
Key management and distribution
Riya Choudhary
 
PPT
Network security cryptographic hash function
Mijanur Rahman Milon
 
PPT
Secure Socket Layer
Naveen Kumar
 
PDF
Classical encryption techniques
Dr.Florence Dayana
 
PPTX
Cryptography and network security
patisa
 
PPTX
Hash Function
Siddharth Srivastava
 
PDF
AES-Advanced Encryption Standard
Prince Rachit
 
PPTX
Principles of public key cryptography and its Uses
Mohsin Ali
 
PDF
Introduction to Cryptography
Seema Goel
 
DOCX
S/MIME
maria azam
 
PPTX
Diffie hellman key exchange algorithm
Sunita Kharayat
 
PPTX
Cryptography and Network Security
Pa Van Tanku
 
PPTX
Digital signature(Cryptography)
Soham Kansodaria
 
PPT
Email security
Indrajit Sreemany
 
PDF
MD-5 : Algorithm
Sahil Kureel
 
PPT
X.509 Certificates
Sou Jana
 
Public Key Cryptography
Gopal Sakarkar
 
block ciphers
Asad Ali
 
Web Security
Dr.Florence Dayana
 
RSA ALGORITHM
Dr. Shashank Shetty
 
Key management and distribution
Riya Choudhary
 
Network security cryptographic hash function
Mijanur Rahman Milon
 
Secure Socket Layer
Naveen Kumar
 
Classical encryption techniques
Dr.Florence Dayana
 
Cryptography and network security
patisa
 
Hash Function
Siddharth Srivastava
 
AES-Advanced Encryption Standard
Prince Rachit
 
Principles of public key cryptography and its Uses
Mohsin Ali
 
Introduction to Cryptography
Seema Goel
 
S/MIME
maria azam
 
Diffie hellman key exchange algorithm
Sunita Kharayat
 
Cryptography and Network Security
Pa Van Tanku
 
Digital signature(Cryptography)
Soham Kansodaria
 
Email security
Indrajit Sreemany
 
MD-5 : Algorithm
Sahil Kureel
 
X.509 Certificates
Sou Jana
 
Ad

Similar to Message authentication (20)

PPT
Message authentication and hash function
omarShiekh1
 
PPT
Information and data security cryptography and network security
Mazin Alwaaly
 
PDF
Cs8792 cns - unit iv
ArthyR3
 
PDF
Cns
ArthyR3
 
PPTX
Message auth. code Based on Hash Functions.pptx
aribariaz507
 
PPTX
MACs based on Hash Functions, MACs based on Block Ciphers
Maitree Patel
 
PDF
Computer network system presentation pdf
prajjavalsingh2629
 
PPTX
cryptography and network security cns.pptx
gkumar610
 
PPTX
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
PPT
Message Authentication Requirement-MAC
Sou Jana
 
PPT
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
jeevasreemurali
 
PPTX
unit - III.pptx
sandyBS
 
PDF
CNIT 141: 7. Keyed Hashing
Sam Bowne
 
PPTX
Meessage authentication and hash functions.pptx
JohnLagman3
 
PPTX
5. message authentication and hash function
Chirag Patel
 
PPTX
Information and network security 41 message authentication code
Vaibhav Khanna
 
PDF
BAIT1103 Chapter 2
limsh
 
PPTX
unit4- predicate logic in artificial intelligence
thirugnanasambandham4
 
PPT
Message Authentication: MAC, Hashes
Shafaan Khaliq Bhatti
 
PDF
CNIT 1417. Keyed Hashing
Sam Bowne
 
Message authentication and hash function
omarShiekh1
 
Information and data security cryptography and network security
Mazin Alwaaly
 
Cs8792 cns - unit iv
ArthyR3
 
Cns
ArthyR3
 
Message auth. code Based on Hash Functions.pptx
aribariaz507
 
MACs based on Hash Functions, MACs based on Block Ciphers
Maitree Patel
 
Computer network system presentation pdf
prajjavalsingh2629
 
cryptography and network security cns.pptx
gkumar610
 
Information and network security 42 security of message authentication code
Vaibhav Khanna
 
Message Authentication Requirement-MAC
Sou Jana
 
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
jeevasreemurali
 
unit - III.pptx
sandyBS
 
CNIT 141: 7. Keyed Hashing
Sam Bowne
 
Meessage authentication and hash functions.pptx
JohnLagman3
 
5. message authentication and hash function
Chirag Patel
 
Information and network security 41 message authentication code
Vaibhav Khanna
 
BAIT1103 Chapter 2
limsh
 
unit4- predicate logic in artificial intelligence
thirugnanasambandham4
 
Message Authentication: MAC, Hashes
Shafaan Khaliq Bhatti
 
CNIT 1417. Keyed Hashing
Sam Bowne
 
Ad

More from CAS (20)

PPTX
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
 
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
PPT
RRB JE Stage 2 Computer and Applications Questions Part 4
CAS
 
PPT
RRB JE Stage 2 Computer and Applications Questions part 3
CAS
 
PPT
RRB JE Stage 2 Computer and Applications Questions Part 2
CAS
 
PPT
RRB JE Stage 2 Computer and Applications Questions Part 1
CAS
 
PPTX
Introduction to IoT Security
CAS
 
PPTX
Introduction to research methodology
CAS
 
PPTX
Can you solve this
CAS
 
PPTX
Symmetric encryption and message confidentiality
CAS
 
PPTX
Public key cryptography and message authentication
CAS
 
PPTX
Malicious software
CAS
 
PPTX
Legal and ethical aspects
CAS
 
PPT
IT Security management and risk assessment
CAS
 
PPTX
It security controls, plans, and procedures
CAS
 
PPTX
Intrusion detection
CAS
 
PPTX
Human resources security
CAS
 
PPT
Database security
CAS
 
PPTX
Cryptographic tools
CAS
 
PPT
Internet security association and key management protocol (isakmp)
CAS
 
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 4
CAS
 
RRB JE Stage 2 Computer and Applications Questions part 3
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 2
CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 1
CAS
 
Introduction to IoT Security
CAS
 
Introduction to research methodology
CAS
 
Can you solve this
CAS
 
Symmetric encryption and message confidentiality
CAS
 
Public key cryptography and message authentication
CAS
 
Malicious software
CAS
 
Legal and ethical aspects
CAS
 
IT Security management and risk assessment
CAS
 
It security controls, plans, and procedures
CAS
 
Intrusion detection
CAS
 
Human resources security
CAS
 
Database security
CAS
 
Cryptographic tools
CAS
 
Internet security association and key management protocol (isakmp)
CAS
 

Recently uploaded (20)

PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
OFFOFFBOX™ – A New Era for African Film | Startup Presentation
ambaicciwalkerbrian
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 

Message authentication

  • 1. COMPUTER SECURITY MESSAGE AUTHENTICATION Mr. RAJASEKAR RAMALINGAM Faculty - Department of IT College of Applied Sciences – Sur, Sultanate of Oman. [email protected]
  • 2. CONTENT 1. MESSAGE SECURITY REQUIREMENTS 2. MESSAGE AUTHENTICATION 3. MESSAGE ENCRYPTION 4. HASH FUNCTIONS 5. MESSAGE AUTHENTICATION CODE (MAC) 6. HMAC 2MESSAGE AUTHENTICATION
  • 3. 1. MESSAGE SECURITY REQUIREMENTS • In communications from a computer to computer, the following attacks could be identified: • Disclosure: Release of message contents • Traffic analysis: Discovery of the pattern of traffic between parties • Masquerade: Insertion of messages into the network from a fraudulent source • Content modification: Modification of the contents of a message • Sequence modification: Modification to a sequence of messages between parties • Timing modification: Delay or replay of messages • Source repudiation: Denial of transmission of message by source • Destination repudiation: Denial of receipt of message by destination 3MESSAGE AUTHENTICATION
  • 4. 2. MESSAGE AUTHENTICATION • Message authentication is concerned with: • Protecting the integrity of a message • Validating identity of originator • Non-repudiation of origin (dispute resolution) • Will consider the security requirements • Three alternative functions used: • Message encryption • Hash functions • Message Authentication Code (MAC) 4MESSAGE AUTHENTICATION
  • 5. 3. MESSAGE ENCRYPTION 3.1 SYMMETRIC MESSAGE ENCRYPTION • Encryption can also provides authentication • If symmetric encryption is used then: • Receiver know sender must have created it • Since only sender and receiver now key used • Know content cannot of been altered • If message has suitable structure, redundancy or a checksum to detect any changes 5MESSAGE AUTHENTICATION
  • 6. 3.2 PUBLIC-KEY MESSAGE ENCRYPTION • If public-key encryption is used: • Encryption provides no confidence of sender • Since anyone potentially knows public-key However if • Sender signs message using their private-key • Then encrypts with recipients public key • Have both secrecy and authentication • Again need to recognize corrupted messages • But at cost of two public-key uses on message 6MESSAGE AUTHENTICATION
  • 7. 4. HASH FUNCTIONS Condenses arbitrary message to fixed size h = H(M) Usually assume hash function is public Hash used to detect changes to message Want a cryptographic hash function Computationally infeasible to find data mapping to specific hash (one-way property) Computationally infeasible to find two data to same hash (collision-free property) 7MESSAGE AUTHENTICATION
  • 8. 4.1 CRYPTOGRAPHIC HASH FUNCTION • Figure depicts the general operation of a cryptographic hash function. • The input is padded out to an integer multiple of some fixed length (e.g., 1024 bits) and the padding includes the value of the length of the original message in bits. • The length field is a security measure to increase the difficulty for an attacker to produce an alternative message with the same hash value. 8MESSAGE AUTHENTICATION
  • 9. 4.2 HASH FUNCTIONS & MESSAGE AUTHENTICATION • Message authentication is a mechanism or service used to verify the integrity of a message, by assuring that the data received are exactly as sent. • Figure A, B, C and D illustrates a variety of ways in which a hash code can be used to provide message authentication, as follows: 9MESSAGE AUTHENTICATION
  • 10. • The message plus concatenated hash code is encrypted using symmetric encryption. Since only A and B share the secret key, the message must have come from A and has not been altered. • The hash code provides the structure or redundancy required to achieve authentication. A 10MESSAGE AUTHENTICATION
  • 11. • Only the hash code is encrypted, using symmetric encryption. This reduces the processing burden for those applications not requiring confidentiality. B 11MESSAGE AUTHENTICATION
  • 12. C • Shows the use of a hash function but no encryption for message authentication. • The technique assumes that the two communicating parties share a common secret value S. • A computes the hash value over the concatenation of M and S and appends the resulting hash value to M. • Because B possesses S, it can re-compute the hash value to verify. • Because the secret value itself is not sent, an opponent cannot modify an intercepted message and cannot generate a false message. 12MESSAGE AUTHENTICATION
  • 13. • Confidentiality can be added to the approach of (c) by encrypting the entire message plus the hash code. D 13MESSAGE AUTHENTICATION
  • 14. 5. MESSAGE AUTHENTICATION CODE (MAC) • Generated by an algorithm that creates a small fixed-sized block • Depending on both message and some key • Like encryption though need not be reversible • Appended to message as a signature • Receiver performs same computation on message and checks it matches the MAC • Provides assurance that message is unaltered and comes from sender 14MESSAGE AUTHENTICATION
  • 15. Message Authentication Code… • A small fixed-sized block of data • Generated from message + secret key • MAC = C(K,M) • Appended to message when sent 15MESSAGE AUTHENTICATION
  • 16. 5.1 MESSAGE AUTHENTICATION CODES • As shown the MAC provides authentication • Why use a MAC? • sometimes only authentication is needed • sometimes need authentication to persist longer than the encryption (eg. archival use) • Can also use encryption for secrecy • generally use separate keys for each • can compute MAC either before or after encryption • is generally regarded as better done before 16MESSAGE AUTHENTICATION
  • 17. 5.2 MAC PROPERTIES • A MAC is a cryptographic checksum MAC = CK(M) • condenses a variable-length message M • using a secret key K • to a fixed-sized authenticator • Is a many-to-one function • potentially many messages have same MAC • but finding these needs to be very difficult 17MESSAGE AUTHENTICATION
  • 18. 6. HMAC 6.1 HMAC DESIGN OBJECTIVES Use, without modifications, hash functions Allow for easy re-placeability of embedded hash function Preserve original performance of hash function without significant degradation Use and handle keys in a simple way. Have well understood cryptographic analysis of authentication mechanism strength 18MESSAGE AUTHENTICATION
  • 19. HMAC… • Uses hash function on the message: HMACK(M)= Hash[(K+ XOR opad) || Hash[(K+ XOR ipad) || M)] ] • where K+ is the key padded out to size • opad, ipad are specified padding constants • Overhead is just 3 more hash calculations than the message needs alone • Any hash function can be used • eg. MD5, SHA-1, RIPEMD-160, Whirlpool 19MESSAGE AUTHENTICATION
  • 20. HMAC Overview Figure Illustrates the overall operation of HMAC: HMACK = Hash[(K+ XOR opad) || Hash[(K+ XOR ipad) || M)] where: K+ is K padded with zeros on the left so that the result is b bits in length ipad is a pad value of 36 hex repeated to fill block opad is a pad value of 5C hex repeated to fill block M is the message input to HMAC (including the padding specified in the embedded hash function) Note that the XOR with ipad results in flipping one-half of the bits of K. Similarly, the XOR with opad results in flipping one-half of the bits of K, but a different set of bits. In effect, pseudo randomly generated two keys from K.MESSAGE AUTHENTICATION 20
  • 21. • HMAC should execute in approximately the same time as the embedded hash function for long messages. • HMAC adds three executions of the hash compression function (for Si, So, and the block produced from the inner hash). • A more efficient implementation is possible by precomputing the internal hash function on (K+ XOR opad) and (K+ XOR ipad) and inserting the results into the hash processing at start & end. • With this implementation, only one additional instance of the compression function is added to the processing normally produced by the hash function. • This is especially worthwhile if most of the messages for which a MAC is computed are short. 21MESSAGE AUTHENTICATION
  • 22. 6.2 HMAC SECURITY • Proved security of HMAC relates to that of the underlying hash algorithm • Attacking HMAC requires either: • Brute force attack on key used • Birthday attack (but since keyed would need to observe a very large number of messages) • Choose hash function used based on speed verses security constraints MESSAGE AUTHENTICATION 22

Editor's Notes

  • #5: One of the most fascinating and complex areas of cryptography is that of message authentication and the related area of digital signatures. We now consider how to protect message integrity (ie protection from modification), as well as confirming the identity of the sender. Generically this is the problem of message authentication, and in eCommerce applications is arguably more important than secrecy. Message Authentication is concerned with: protecting the integrity of a message, validating identity of originator, & non-repudiation of origin (dispute resolution). There are three types of functions that may be used to produce an authenticator: a hash function, message encryption, message authentication code (MAC). Hash functions, and how they may serve for message authentication, are discussed in Chapter 11. The remainder of this section briefly examines the remaining two topics. The remainder of the chapter elaborates on the topic of MACs.
  • #6: Message encryption by itself can provide a measure of authentication. The analysis differs for symmetric and public-key encryption schemes. If use symmetric encryption, If no other party knows the key, then confidentiality is provided. As well, symmetric encryption provides authentication as well as confidentiality, since only the other party can have encrypted a properly constructed message (Stallings Figure 12.1a). Here, the ciphertext of the entire message serves as its authenticator, on the basis that only those who know the appropriate keys could have validly encrypted the message. This is provided you can recognize a valid message (ie if the message has suitable structure such as redundancy or a checksum to detect any changes).
  • #7: With public-key techniques, can use a digital signature which can only have been created by key owner to validate the integrity of the message contents. To provide both confidentiality and authentication, A can encrypt M first using its private key, which provides the digital signature, and then using B's public key, which provides confidentiality (Stallings Figure 12.1d). The disadvantage of this approach is that the public-key algorithm, which is complex, must be exercised four times rather than two in each communication.
  • #15: An alternative authentication technique involves the use of a secret key to generate a small fixed-size block of data, known as a cryptographic checksum or MAC that is appended to the message. This technique assumes that two communicating parties, say A and B, share a common secret key K. A MAC function is similar to encryption, except that the MAC algorithm need not be reversible, as it must for decryption.
  • #16: An alternative authentication technique involves the use of a secret key to generate a small fixed- size block of data, known as a cryptographic checksum or MAC that is appended to the message. This technique assumes that two communicating parties, say A and B, share a common secret key K. When A has a message to send to B, it calculates the MAC as a function of the message and the key: MAC = C(K, M). The message plus MAC are transmitted to the intended recipient. The recipient performs the same calculation on the received message, using the same secret key, to generate a new MAC. The received MAC is compared to the calculated MAC (Stallings Figure 12.4a). If we assume that only the receiver and the sender know the identity of the secret key, and if the received MAC matches the calculated MAC, then the receiver is assured that the message has not been altered, is from the alleged sender, and if the message includes a sequence number then the receiver can be assured of the proper sequence because an attacker cannot successfully alter the sequence number. A MAC function is similar to encryption. One difference is that the MAC algorithm need not be reversible, as it must for decryption. In general, the MAC function is a many-to-one function.
  • #17: The process depicted on the previous slide provides authentication but not confidentiality, because the message as a whole is transmitted in the clear. Confidentiality can be provided by performing message encryption either after (see Stallings Figure 12.4b) or before (see Stallings Figure 12.4c) the MAC algorithm. In both these cases, two separate keys are needed, each of which is shared by the sender and the receiver. Typically, it is preferable to tie the authentication directly to the plaintext, so the method of Figure 12.4b is used. Can use MAC in circumstances where just authentication is needed (or needs to be kept), see text for examples (e.g. such as when the same message is broadcast to a number of destinations; when one side has a heavy load and cannot afford the time to decrypt all incoming messages; or do not need to keep messages secret, but must authenticate messages). Finally, note that the MAC does not provide a digital signature because both sender and receiver share the same key.
  • #18: A MAC (also known as a cryptographic checksum, fixed-length authenticator, or tag) is generated by a function C. The MAC is appended to the message at the source at a time when the message is assumed or known to be correct. The receiver authenticates that message by re-computing the MAC. The MAC function is a many-to-one function, since potentially many arbitrarily long messages can be condensed to the same summary value, but don’t want finding them to be easy (see text for discussion)!
  • #19: RFC 2104 lists the following design objectives for HMAC: • To use, without modifications, available hash functions. In particular, hash functions that perform well in software, and for which code is freely and widely available. • To allow for easy replaceability of the embedded hash function in case faster or more secure hash functions are found or required. • To preserve the original performance of the hash function without incurring a significant degradation. • To use and handle keys in a simple way. • To have a well understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assumptions about the embedded hash function.
  • #20: The idea of a keyed hash evolved into HMAC, designed to overcome some problems with the original proposals. It involves hashing padded versions of the key concatenated with the message, and then with another outer hash of the result prepended by another padded variant of the key. The hash function need only be used on 3 more blocks than when hashing just the original message (for the two keys + inner hash). HMAC can use any desired hash function, and has been shown to have the same security as the underlying hash function. Can choose the hash function to use based on speed/security concerns.
  • #23: The appeal of HMAC is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of HMAC. The security of a MAC function is generally expressed in terms of the probability of successful forgery with a given amount of time spent by the forger and a given number of message-MAC pairs created with the same key. Have two classes of attacks: brute force attack on key used which has work of order 2^n; or a birthday attack which requires work of order 2^(n/2) - but which requires the attacker to observe 2^n blocks of messages using the same key - very unlikely. For a hash code length of 128 bits, this requires 264 observed blocks (272 bits) generated using the same key. On a 1-Gbps link, one would need to observe a continuous stream of messages with no change in key for about 150,000 years in order to succeed. So even MD5 is still secure for use in HMAC given these constraints.