Which public function that maps a message of any length into a fixed length hash value which serves as its authenticator?

CRYPTOGRAPHIC HASHFUNCTIONSB A S E D O N S TA L L I N G S & C A R B U N A RR I C K B L A Z E K , P H D .

MESSAGE AUTHENTICATIONAS A COUNTERMEASUREDisclosureTraffic analysisDiscovery of the pattern oftraffic between partiesMasqueradeContent modificationSequence modificationTiming modificationSource repudiationDestination repudiation2UseEncryptionUseAuthenticationDigital Signature

HASH FUNCTIONUSES3MessageIntegrity/Authentication Check (MAC)Message OriginCheck (Signature)Combined withencryption

OTHER HASH FUNCTION USESCommonly used tocreate a one-waypassword fileWhen a user enters apassword, the hashof that password iscompared to thestored hash value forverificationThis approach topassword protectionis used by mostoperating systemsCan be used toconstruct apseudorandomfunction (PRF) or apseudorandomnumber generator(PRNG)A commonapplication for ahash-based PRF isfor the generation ofsymmetric keys4H(salt, pwd)

HASH FUNCTIONSA hash function Haccepts a variable-length block of dataMas input and producesa fixed-size hash valueh =H(M)Principal object isdata integrity6How is the sizereduced ?

HASH FUNCTIONHash function H is a lossy compression functionRepeated Compression using Block ChainingAvoid Collision: H(x)=H(x’) for some inputs x≠x’H(x) should look “random”Cryptographic hash functionAn algorithm for which it is computationally infeasible to findeither:(a) a data object that maps to a pre-specified hash result (theone-way property)(b) two data objects that map to the same hash result (thecollision-free property)7

Figure11.2Attack Against Hash Function(b) Man-in-the-middleattackAliceDarthBobBobAliceCOMPAREdata8Does notprotect againstMITM

EKMH| |DKMH(M)HCompare(a)E(K, [M|| H(M)])Destination BSource A9M + HEncrypted wSymmetric KeyE(K, H(M))

MESSAGEAUTHENTICATIONCODE (MAC)Also known as a keyed hash functionTypically used between two parties that share a secretkey to authenticate information exchanged between11Takes as input a secret key and a data block andproduces a hash value (MAC) which is associatedwith the protected messageIf the integrity of the message needs to bechecked, the MAC function can be applied to themessage and the result compared with theassociated MAC valueAn attacker who alters the message will beunable to alter the associated MAC value withoutknowledge of the secret key

EXAMPLE MD5 &SHA112md5_digest("The quick brown fox jumps over the lazydog") =9e107d9d372bb6826bd81d3542a419d6md5_digest("The quick brown fox jumps over the lazycog") =1055d3e698d289f2af8663725127bd4bsha1_digest("The quick brown fox jumps over the lazydog”) =2fd4e1c67a2d28fced849ee1bb76e7391b93eb12sha1_digest("The quick brown fox jumps over the lazycog”) =de9f2c7fd25e1b3afad3e85a0bd17d9b100db4b3

MESSAGEAUTHENTICATIONFUNCTIONSTwo levels offunctionality:Hash function

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 36 pages?

Upload your study docs or become a

Course Hero member to access this document

Tags

Cryptographic hash function

Which function is used to map data of any size to a fixed length?

A hash function is any function that can be used to map data of arbitrary size to fixed-size values.

Is a public function of the message and a secret key that produces a fixed length value serves as the authenticator?

Message Authentication Code (MAC): A public function of the message and a secret key that produces a fixed length value that serves as the authenticator.

Which technique is used in hash algorithm to produce fixed length string from variable length?

A one-way hash function, also known as a message digest, is a mathematical function that takes a variable-length input string and converts it into a fixed-length binary sequence that is computationally difficult to invert—that is, generate the original string from the hash.

What are the authentication functions?

Authentication functions: Assures the data received are exactly as sent (i.e. contain no modification, insertion ,deletion or replay) Assures that identity of the sender is valid. When a hash function is used to provide message authentication, the hash function value is often referred to as a message digest.