第12章 Hash和MAC算法.ppt

上传人:创****公 文档编号:768650 上传时间:2018-10-31 格式:PPT 页数:34 大小:902.50KB
下载 相关 举报
第12章 Hash和MAC算法.ppt_第1页
第1页 / 共34页
第12章 Hash和MAC算法.ppt_第2页
第2页 / 共34页
第12章 Hash和MAC算法.ppt_第3页
第3页 / 共34页
第12章 Hash和MAC算法.ppt_第4页
第4页 / 共34页
第12章 Hash和MAC算法.ppt_第5页
第5页 / 共34页
点击查看更多>>
资源描述

1、第 12章 消息认证码Message Authentication message authentication is concerned with protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the security requirements then three alternative functions used message encryption hash func

2、tion message authentication code (MAC)Security Requirements disclosure traffic analysis masquerade content modification sequence modification timing modification source repudiation destination repudiationSymmetric Message Encryption encryption can also provides authentication if symmetric encryption

3、 is used then: receiver know sender must have created it, since only sender and receiver know key used know content cannot have been altered, if message has suitable structure, redundancy or a checksum to detect any changesPublic-Key Message Encryption if public-key encryption is used: encryption pr

4、ovides no confidence of sender since anyone potentially knows public-key however if sender signs message using their private-key then encrypts with recipients public key have both secrecy and authentication again need to recognize corrupted messages but at cost of two public-key uses on messageHash

5、and MAC Algorithms Hash Functions condense arbitrary size message to fixed size by processing message in blocks through some compression function either custom or block cipher based Message Authentication Code (MAC) fixed sized authenticator for some message to provide authentication for message by

6、using block cipher mode or hash functionMessage Authentication Code (MAC) generated by an algorithm that creates a small fixed-sized blockdepending on both message and some keylike encryption though need not be reversible appended to message as a signature receiver performs same computation on messa

7、ge and checks it matches the MAC provides assurance that message is unaltered and comes from senderMessage Authentication Code a small fixed-sized block of data generated from message + secret key MAC = C(K, M) appended to message when sentMessage Authentication Codes as shown the MAC provides authe

8、ntication can also use encryption for secrecy generally use separate keys for each can compute MAC either before or after encryption is generally regarded as better done before why use a MAC? sometimes only authentication is needed (e.g., SNMP) sometimes need authentication to persist longer than th

9、e encryption (eg. archival use) note that a MAC is not a digital signatureMAC Properties a MAC is a cryptographic checksumMAC = CK(M)condenses a variable-length message Musing a secret key Kto a fixed-sized authenticator is a many-to-one function potentially many messages have same MAC but finding these needs to be very difficult

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 教育教学资料库 > 课件讲义

Copyright © 2018-2021 Wenke99.com All rights reserved

工信部备案号浙ICP备20026746号-2  

公安局备案号:浙公网安备33038302330469号

本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。