ISA Chapter Three
ISA Chapter Three
Security
Chapter 3
Public-Key Cryptography and
Message Authentication
1
Overview
• Message Authentication
• Secure Hash Functions and HMAC
• Public-Key Cryptography Principles
• Public-Key Cryptography Algoroithms
• Digital Signatures
• Key Management
Authentication
• In addition to confidentiality, message
authentication is an important security function
• “A message, file, document or data is said to be
authentic when it is genuine and came from its
alleged source.”
• Encryption prevents against passive attacks
(eavesdropping)
• Message Authentication prevents against active
attacks or falsification.
Message Authentication
• Message authentication is concerned with:
– protecting the integrity of a message
– validating identity of originator
– non-repudiation of origin (dispute resolution)
• The three alternative functions used:
– hash function
– message encryption
– message authentication code (MAC)
Message Authentication
• Requirements - must be able to verify that:
1. Message came from apparent source or
author
2. Contents have not been altered
3. Timeliness – that it was sent at a certain
time or sequence.
public
key
public
key
? private
key
Alice Bob
46
Digital signatures
• A digital signature is an encryption of a
document with the creator’s private key
51
Key management
• Distribution of public keys - major problem
– What’s the issue?
– Can’t we just trust Mallory if she claims a key
as her public key?
public Mallory
key
public
key
? private
key
Alice Bob
Public keys to exchange secret keys
? private
key
Bob
Alice
public
key
Problem: How does Alice know that the
public key she received is really Bob’s
public key?
Authentication using Public-
Key System
Public-key certificates
• Anyone can forge public-keys