15-Hash Functions & Authentication - Message Authentication Code (MAC) - HMAC-05!03!2024
15-Hash Functions & Authentication - Message Authentication Code (MAC) - HMAC-05!03!2024
Reference Books:
1. Kaufman, Perlman and Speciner, “Network Security: Private
Communication in a Public World”, 2nd edition, Pearson Publishers ,
2002.
2. Menezes, van Oorschot, and Vanstone, “The Handbook of Applied
Cryptography”, 20th Edition, WILEY, 2015.
3. H. Silverman, “A Friendly Introduction to Number Theory,” 4th
Edition, Boston: Pearson, 2012.
Module 4: Hash Functions and
Authentication(4 Hours)
Message Authentication Code(MAC)
MD5
Secure Hash algorithms(SHA)
HMAC
Digital Signature
Digital Signature Standards(DSS)
Why Hash Functions and Authentication?
Cryptography systems( Symmetric &
Asymmetric) that we have studied so far
provide Confidentiality but not Integrity.
What is Message Integrity?
◦ Alice and Bob need to be sure that the contents
of the message are not modified during
transmission.
Why Hash Functions and Authentication?-
Example
A person(Say “Alice”) may write a property will to
distribute his estate after death. The will does not
need to be encrypted. (Not Mandatory).
After his death, anyone can examine the will, but
the integrity of the will needs to be preserved. The
Person(Alice) does not want the contents of the
will to be changed.
Kill
123
123
qwer7891
asdf1234
h
h+M
M Hash
M h
h Decrypt
PRA
Completely
HASH FUNCTIONS – CASE II encrypted
append
M M
M E D
M
h h h
h
K K
h
Hash E
Encrypted Hash Code h
D
KPRA
compare KPuA
h
Hash
1024 BITS
1024 BITS 1024 BITS
SHA 512