Documente Academic
Documente Profesional
Documente Cultură
Introduction
Functions
Auth. with
Encryption
Auth. with MAC
Security
Algorithms
1/21
Message Authentication Codes
CSS322: Security and Cryptography
Sirindhorn International Institute of Technology
Thammasat University
Prepared by Steven Gordon on 28 October 2013
css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex, r2965
CSS322
Introduction
Functions
Auth. with
Encryption
Auth. with MAC
Security
Algorithms
2/21
Contents
Message Authentication Requirements and Functions
Authentication using Symmetric Key Encryption
Authentication with Message Authentication Codes
Security of MACs
MAC Algorithms
CSS322
Introduction
Functions
Auth. with
Encryption
Auth. with MAC
Security
Algorithms
3/21
Attacks on Communications across Network
1. Disclosure: encryption
2. Trac analysis: encryption
3. Masquerade: message authentication
4. Content modication: message authentication
5. Sequence modication: message authentication
6. Timing modication: message authentication
7. Source repudiation: digital signatures
8. Destination repudiation: digital signatures
CSS322
Introduction
Functions
Auth. with
Encryption
Auth. with MAC
Security
Algorithms
4/21
Authentication
Hash Functions
E.g. 26
n
possible messages of length n; only small
subset are valid English phrases
Packet header
CSS322
Introduction
Functions
Auth. with
Encryption
Auth. with MAC
Security
Algorithms
12/21
Contents
Message Authentication Requirements and Functions
Authentication using Symmetric Key Encryption
Authentication with Message Authentication Codes
Security of MACs
MAC Algorithms
CSS322
Introduction
Functions
Auth. with
Encryption
Auth. with MAC
Security
Algorithms
13/21
Authentication with Message Authentication
Codes
Attacker knows [x
1
, T
1
] where T
1
= MAC(K, x
1
)
Eort to nd K is approximately 2
k
Brute Force Attack on MAC value
For x
m
, nd T
m
without knowing K