Differences between revisions 8 and 9
Revision 8 as of 2005-12-04 23:48:52
Size: 2102
Editor: yakko
Comment:
Revision 9 as of 2005-12-04 23:53:54
Size: 2647
Editor: yakko
Comment:
Deletions are marked like this. Additions are marked like this.
Line 10: Line 10:
|| Message Digest |||| see 339 ||
|| One-way hash function |||| see 339||
|| Strong/Weak collision resistance |||| see 339|||
|| Message Digest ||||<(> see 339 ||
|| One-way hash function ||||<(> see 339||
|| Strong/Weak collision resistance ||||<(> see 339|||
Line 15: Line 15:

'''What types of attacs are addressed by message authentication?'''

See Message Authentication above or p 313 3-6.

'''What two levels of functionality comprise a message authentication ro digital signature mechanism?'''

   1. The lower level: some sort of function that produces an authenticator (see authenticator above).
   1. A higher level: Protocol that enables a receiver to verify the authenticity of a messege using the lower level function.

'''What are some approaches to producing message authentication?'''

Terms

Authenicator

Additional information appended to a message to enable the receiver to verify that the message should be accepted as authentic. The authenticator may be functionally independent of the content of the message itself (e.g., a nounce or a source identifier) or it may be a function of the message contents (e.g., a hash value or a cryptographic checksum).

Birthday Attack

When short hash codes are used it is not difficult to find two messages that produce the same hash code, but have slightly different meanings - p332-333.

Birthday Paradox

Let latex2($P(n,k)$) be the probability that at least one duplicate in k items exists when each item can take on one of n different values. So latex2($P(365,10)$) is the probability that we have a duplicate in 10 peoples birthdays. It is easier to calculate the number of ways we can not have a duplicate latex2($N=365 \times 364 \times ... \times (365-k+1) = \frac{365!}{(365-k)!}$). The number of ways with duplicates is latex2($N_D = (365)^k$). Then the probability of at least one duplicate is latex2($1-\frac{365!}{(365-k)!(365)^k}$)

Compression Function

In the context of hash functions takes two inputs: (1) an n-bit input from the previous step called a chaining variable and a b-bit block (block of the message), and outputs a n-bit output.

Cryptographic Checksum

An authenticator that is a cryptographic function of both the data to be auth4enticated and a secret key. Also referred to as a message authentication code (MAC)

Hash Function

A function that maps a variable-length data block or message into a fixed-length value called a hash code (also referred to as a message digest).

Message Authentication

Measures to deal with (1) Masquerade Attack (2) Content Modification Attack (3) Sequence Modification Attack (4) Timing Modification Attack

Message Digest

see 339

One-way hash function

see 339

Strong/Weak collision resistance

see 339|

Review Questions

What types of attacs are addressed by message authentication?

See Message Authentication above or p 313 3-6.

What two levels of functionality comprise a message authentication ro digital signature mechanism?

  1. The lower level: some sort of function that produces an authenticator (see authenticator above).
  2. A higher level: Protocol that enables a receiver to verify the authenticity of a messege using the lower level function.

What are some approaches to producing message authentication?

Csce877Ch11Notes (last edited 2020-01-26 17:59:30 by scot)