Differences between revisions 5 and 6
Revision 5 as of 2005-12-04 23:43:10
Size: 1998
Editor: yakko
Comment:
Revision 6 as of 2005-12-04 23:43:20
Size: 1996
Editor: yakko
Comment:
Deletions are marked like this. Additions are marked like this.
Line 10: Line 10:

Terms

Authenicator

Additional information appended to a message to enable the receiver to verify that the message should be accepted as authentic. The authenticator may be functionally independent of the content of the message itself (e.g., a nounce or a source identifier) or it may be a function of the message contents (e.g., a hash value or a cryptographic checksum).

Birthday Attack

When short hash codes are used it is not difficult to find two messages that produce the same hash code, but have slightly different meanings - p332-333.

Birthday Paradox

Let latex2($P(n,k)$) be the probability that at least one duplicate in k items exists when each item can take on one of n different values. So latex2($P(365,10)$) is the probability that we have a duplicate in 10 peoples birthdays. It is easier to calculate the number of ways we can not have a duplicate latex2($N=365 \times 364 \times ... \times (365-k+1) = \frac{365!}{(365-k)!}$). The number of ways with duplicates is latex2($N_D = (365)^k$). Then the probability of at least one duplicate is latex2($1-\frac{365!}{(365-k)!(365)^k}$)

Compression Function

In the context of hash functions takes two inputs: (1) an n-bit input from the previous step called a chaining variable and a b-bit block (block of the message), and outputs a n-bit output.

Cryptographic Checksum

An authenticator that is a cryptographic function of both the data to be auth4enticated and a secret key. Also referred to as a message authentication code (MAC)

Hash Function

A function that maps a variable-length data block or message into a fixed-length value called a hash code (also referred to as a message digest).

|| Message Authentication ||||<(> Measures to deal with

  • Masquerade Attack
  • Content Modification Attack
  • Sequence Modification Attack
  • Timing Modification Attack
  • Source/Destination Repudiation

||

Csce877Ch11Notes (last edited 2020-01-26 17:59:30 by scot)