Files
uni/year2/semester1/logseq-stuff/pages/Message Authentication.md

1.1 KiB

  • #CT255 - Next Generation Technologies II
  • Previous Topic: Block Ciphers & Stream Ciphers
  • Next Topic:
  • Relevant Slides: ct255_09.pdf
  • There are four types of attacks in the context of communication across a network, which are addressed by message authentication:
    • Masquerade (insertion of messages into the network from a fraudulent source).
    • Content modification.
    • Sequence modification.
    • Timing modification (delete or repeat messages).
  • Message authentication is concerned with:
    • Protecting the integrity of a message.
    • Validating the identity of the originator of the message.
    • Validating sequencing & timeliness.
    • Non-repudiation of origin (dispute resolution).
  • Hash Functions

    • A hash function is a variation of a MAC, which produces a fixed-size hash code ("fingerprint") based on a variably-sized input message.
    • A hash function is public and is not keyed, therefore the hash value must be encrypted.
    • Traditional CRCs are too weak and cannot be used.
      • 128-512 bit hash values are regarded as suitable.