Files
uni/year2/semester1/logseq-stuff/pages/Message Authentication.md

21 lines
1.1 KiB
Markdown

- #[[CT255 - Next Generation Technologies II]]
- **Previous Topic:** [[Block Ciphers & Stream Ciphers]]
- **Next Topic:**
- **Relevant Slides:** ![ct255_09.pdf](../assets/ct255_09_1668712193123_0.pdf)
-
- There are four types of attacks in the context of communication across a network, which are addressed by message authentication:
- Masquerade (insertion of messages into the network from a fraudulent source).
- Content modification.
- Sequence modification.
- Timing modification (delete or repeat messages).
- Message authentication is concerned with:
- Protecting the integrity of a message.
- Validating the identity of the originator of the message.
- Validating sequencing & timeliness.
- Non-repudiation of origin (dispute resolution).
- # Hash Functions
- A hash function is a variation of a MAC, which produces a fixed-size hash code ("fingerprint") based on a variably-sized input message.
- A hash function is public and is not keyed, therefore the hash value must be encrypted.
- Traditional CRCs are too weak and cannot be used.
- 128-512 bit hash values are regarded as suitable.
-