0% found this document useful (0 votes)
4 views

NS unit-IV

This section discusses the importance of message integrity in cryptography, highlighting that while confidentiality is often prioritized, integrity is crucial in certain cases. It introduces concepts such as document fingerprints and message digests, explaining their roles in ensuring integrity. The section also outlines criteria for cryptographic hash functions, emphasizing the need for properties like preimage and collision resistance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

NS unit-IV

This section discusses the importance of message integrity in cryptography, highlighting that while confidentiality is often prioritized, integrity is crucial in certain cases. It introduces concepts such as document fingerprints and message digests, explaining their roles in ensuring integrity. The section also outlines criteria for cryptographic hash functions, emphasizing the need for properties like preimage and collision resistance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

UNIT IV APPLICATION LAYER

SECURITY
11-1 MESSAGE INTEGRITY

The cryptography systems that we have studied so far


provide secrecy, or confidentiality, but not integrity.
However, there are occasions where we may not even
need secrecy but instead must have integrity.

Topics discussed in this section:


11.1 Document and Fingerprint
11.2 Message and Message Digest
11.3 Difference
11.4 Checking Integrity
11.5 Cryptographic Hash Function Criteria
11.2
11.1.1 Document and Fingerprint

One way to preserve the integrity of a document is through


the use of a fingerprint. If Alice needs to be sure that the
contents of her document will not be changed, she can put
her fingerprint at the bottom of the document.

11.3
11.1.2 Message and Message Digest

The electronic equivalent of the document and fingerprint


pair is the message and digest pair.

Figure 11.1 Message and digest

11.4
11.1.3 Difference

The two pairs (document / fingerprint) and (message /


message digest) are similar, with some differences. The
document and fingerprint are physically linked together.
The message and message digest can be unlinked
separately, and, most importantly, the message digest
needs to be safe from change.

Note
The message digest needs to be safe from change.

11.5
11.1.4 Checking Integrity

Figure 11.2 Checking integrity

11.6
11.1.5 Continued

Preimage Resistance

Figure 11.4 Preimage

11.7
11.1.5 Continued

Example 11.1
Can we use a conventional lossless compression method such as
StuffIt as a cryptographic hash function?

Solution
We cannot. A lossless compression method creates a compressed
message that is reversible.

Example 11.2

Can we use a checksum function as a cryptographic hash function?

Solution
We cannot. A checksum function is not preimage resistant, Eve may
find
11.8
several messages whose checksum matches the given one.
11.1.5 Continued

Collision Resistance

Figure 11.6 Collision

11.9

You might also like