Differences between revisions 1 and 9 (spanning 8 versions)
Revision 1 as of 2005-12-04 22:42:03
Size: 578
Editor: yakko
Comment:
Revision 9 as of 2005-12-04 23:53:54
Size: 2647
Editor: yakko
Comment:
Deletions are marked like this. Additions are marked like this.
Line 5: Line 5:
||Birthday Paradox ||||<(> Let [[latex2($P(n,k)$)]] be the probability that at least one duplicate in ''k'' items exists when each item can take on one of ''n'' different values. So [[latex2($P(365,10)$)]] is the probability that we have a duplicate in 10 peoples birthdays. It is easier to calculate the number of ways we can not have a duplicate [[latex2($N=365 \times 364 \times ... \times (365-k+1) = \frac{365!}{(365-k)!}$)]]. The number of ways with duplicates is [[latex2($N_D = (365)^k$)]]. Then the probability of at least one duplicate is [[latex2($1-\frac{365!}{(365-k)!(365)^k}$)]]||
||Compression Function||||<(> In the context of hash functions takes two inputs: (1) an n-bit input from the previous step called a chaining variable and a b-bit block (block of the message), and outputs a n-bit output.||
||Cryptographic Checksum ||||<(> An authenticator that is a cryptographic function of both the data to be auth4enticated and a secret key. Also referred to as a message authentication code (MAC)||
|| Hash Function ||||<(> A function that maps a variable-length data block or message into a fixed-length value called a hash code (also referred to as a message digest).||
|| Message Authentication ||||<(> Measures to deal with (1) Masquerade Attack (2) Content Modification Attack (3) Sequence Modification Attack (4) Timing Modification Attack||
|| Message Digest ||||<(> see 339 ||
|| One-way hash function ||||<(> see 339||
|| Strong/Weak collision resistance ||||<(> see 339|||

== Review Questions ==

'''What types of attacs are addressed by message authentication?'''

See Message Authentication above or p 313 3-6.

'''What two levels of functionality comprise a message authentication ro digital signature mechanism?'''

   1. The lower level: some sort of function that produces an authenticator (see authenticator above).
   1. A higher level: Protocol that enables a receiver to verify the authenticity of a messege using the lower level function.

'''What are some approaches to producing message authentication?'''

Terms

Authenicator

Additional information appended to a message to enable the receiver to verify that the message should be accepted as authentic. The authenticator may be functionally independent of the content of the message itself (e.g., a nounce or a source identifier) or it may be a function of the message contents (e.g., a hash value or a cryptographic checksum).

Birthday Attack

When short hash codes are used it is not difficult to find two messages that produce the same hash code, but have slightly different meanings - p332-333.

Birthday Paradox

Let latex2($P(n,k)$) be the probability that at least one duplicate in k items exists when each item can take on one of n different values. So latex2($P(365,10)$) is the probability that we have a duplicate in 10 peoples birthdays. It is easier to calculate the number of ways we can not have a duplicate latex2($N=365 \times 364 \times ... \times (365-k+1) = \frac{365!}{(365-k)!}$). The number of ways with duplicates is latex2($N_D = (365)^k$). Then the probability of at least one duplicate is latex2($1-\frac{365!}{(365-k)!(365)^k}$)

Compression Function

In the context of hash functions takes two inputs: (1) an n-bit input from the previous step called a chaining variable and a b-bit block (block of the message), and outputs a n-bit output.

Cryptographic Checksum

An authenticator that is a cryptographic function of both the data to be auth4enticated and a secret key. Also referred to as a message authentication code (MAC)

Hash Function

A function that maps a variable-length data block or message into a fixed-length value called a hash code (also referred to as a message digest).

Message Authentication

Measures to deal with (1) Masquerade Attack (2) Content Modification Attack (3) Sequence Modification Attack (4) Timing Modification Attack

Message Digest

see 339

One-way hash function

see 339

Strong/Weak collision resistance

see 339|

Review Questions

What types of attacs are addressed by message authentication?

See Message Authentication above or p 313 3-6.

What two levels of functionality comprise a message authentication ro digital signature mechanism?

  1. The lower level: some sort of function that produces an authenticator (see authenticator above).
  2. A higher level: Protocol that enables a receiver to verify the authenticity of a messege using the lower level function.

What are some approaches to producing message authentication?

Csce877Ch11Notes (last edited 2020-01-26 17:59:30 by scot)