OUTLINE 1 2 3 4 5 6 7 8 9 10 11 12

Introduction to Network Security Symmetric Encryption and Message Confidentiality Public-Key Cryptography and Message Authentication Authentication Electronic Mail Security IP Security Web Security Network Management Security Intruders Malicious Software Firewalls Project: WLAN security

MESSAGE AUTHENTICATION REQUIREMENTS

A couple of the popular hash algorithms are MD5 and SHA1 and you will sometimes see these hash values listed on websites when you go to a software download page. One of the prime examples is ISO images for operating systems like Linux and Windows.

One of the ways you can identify whether a file has been changed from its original state is to check its digital signature if it has one. Or you can check the file integrity by looking at the hash value.

MESSAGE AUTHENTICATION

▪ Requirements - must be able to verify that: 1. Message came from apparent source or author, 2. Contents have not been altered, 3. Sometimes, it was sent at a certain time or sequence. ▪ Protection against active attack (falsification of data and transactions)

5

AUTHENTICATION

APPROACHES TO MESSAGE AUTHENTICATION

▪ Only the sender and receiver should share a key

▪ Message Authentication without Message Encryption ▪ An authentication tag is generated and appended to each message

▪ Message Authentication Code ▪ Calculate the MAC as a function of the message and the key. MAC = F(K, M)

6

▪ Authentication Using Conventional Encryption

HASH FUNCTIONS condenses arbitrary message to fixed size h = H(M) usually assume hash function is public hash used to detect changes to message

want a cryptographic hash function ▪ computationally infeasible to find data mapping to specific hash (one-way property) ▪ computationally infeasible to find two data to same hash (collision-free property)

CRYPTOGRAPHIC HASH FUNCTION For example: student records for a class could be stored in an array C of dimension 10000 by truncating the student’s ID number to its last four digits: H(IDNum) = IDNum% 10000 Given an ID number M, the corresponding record would be inserted at C[H(M)].

BIRTHDAY PROBLEM ▪ How many people do you need so that the probability of having two of them share the same birthday is > 50% ? ▪ Random sample of n birthdays (input) taken from k (365, output) ▪ kn total number of possibilities ▪ (k)n=k(k-1)…(k-n+1) possibilities without duplicate birthday ▪ Probability of no repetition: ▪ p = (k)n/kn  1 - n(n-1)/2k ▪ For k=366, minimum n = 23 ▪ n(n-1)/2 pairs, each pair has a probability 1/k of having the same output

▪ n(n-1)/2k > 50%  n>k1/2

HASH FUNCTIONS & MESSAGE AUTHENTICATION

a. The message plus concatenated hash code is encrypted using symmetric encryption. Because only A and B share the secret key, the message must have come from A and has not been altered. The hash code provides the structure or redundancy required to achieve authentication. Because encryption is applied to the entire message plus hash code, confidentiality is also provided.

HASH FUNCTIONS & MESSAGE AUTHENTICATION

b. Only the hash code is encrypted, using symmetric encryption. This reduces the processing burden for those applications that do not require confidentiality.

HASH FUNCTIONS & MESSAGE AUTHENTICATION

c. It is possible to use a hash function but no encryption for message authentication. The technique assumes that the two communicating parties share a common secret value S.A computes the hash value over the concatenation of M and S and appends the resulting hash value to M. Because B possesses , it can recompute the hash value to verify. Because the secret value itself is not sent, an opponent cannot modify an intercepted message and cannot generate a false message.

HASH FUNCTIONS & MESSAGE AUTHENTICATION

d. Confidentiality can be added to the approach of method (c) by encrypting the entire message plus the hash code.

OTHER HASH FUNCTION USES ▪ to create a one-way password file ▪ store hash of password not actual password ▪ for intrusion detection and virus detection ▪ keep & check hash of files on system ▪ pseudorandom function (PRF) or pseudorandom number generator (PRNG)

TWO SIMPLE INSECURE HASH FUNCTIONS Consider two simple insecure hash functions ▪ bit-by-bit exclusive-OR (XOR) of every block ▪ Ci = bi1 xor bi2 xor . . . xor bim ▪ a longitudinal redundancy check ▪ reasonably effective as data integrity check ▪ one-bit circular shift on hash value ▪ for each successive n-bit block ▪ rotate current hash value to left by1bit and XOR block ▪ good for data integrity but useless for security

HASH FUNCTION REQUIREMENTS

HASH FUNCTION CRYPTANALYSIS ▪ cryptanalytic attacks on hash functions seek to exploit some property of the algorithm to perform some attack other than an exhaustive search. ▪ hash functions use iterative structure ▪ process message in blocks ▪ attacks focus on collisions in function f (compression function)

BLOCK CIPHERS AS HASH FUNCTIONS ▪ can use block ciphers as hash functions. Divide a message M into fixed-size blocks M1, M2, … , MN and use a symmetric encryption system such as DES to compute the hash code as ▪ using H0=0 and zero-pad of final block ▪ compute: Hi = E(Mi, Hi-1) ▪ and use final block as the hash value ▪ resulting hash is too small (64-bit) ▪ both due to direct birthday attack ▪ and to “meet-in-the-middle” attack ▪ other variants also susceptible to attack

SECURE HASH ALGORITHM ▪ SHA originally designed by NIST & NSA in 1993 ▪ was revised in 1995 as SHA-1 ▪ US standard for use with DSA signature scheme ▪ standard is FIPS 180-1 1995, also Internet RFC3174 ▪ nb. the algorithm is SHA, the standard is SHS

▪ based on design of MD4 with key differences

▪ produces 160-bit hash values ▪ recent 2005 results on security of SHA-1 have raised concerns on its use in future applications

REVISED SECURE HASH STANDARD ▪ the national institute of standards and technology (NIST) issued revision federal information processing standard (FIPS) 180-2 in 2002 ▪ adds 3 additional versions of SHA ▪ SHA-256, SHA-384, SHA-512 ▪ designed for compatibility with increased security provided by the AES cipher

▪ structure & detail is similar to SHA-1 (1995) ▪ hence analysis should be similar ▪ but security levels are rather higher

SHA VERSIONS SHA-1 Message digest size

SHA-224 SHA-256 SHA-384 SHA-512

160

224

256

384

512

< 264

< 264

< 264

< 2128

< 2128

Block size

512

512

512

1024

1024

Word size

32

32

32

64

64

Number of steps

80

64

64

80

80

Message size

SHA-512 OVERVIEW

SHA-512 OVERVIEW SHA-512 follows the structure depicted in Stallings Figure 11.8. The processing consists of the following steps: • Step 1: Append padding bits, consists of a single 1-bit followed by the necessary number of 0-bits, so that its length is congruent to 896 modulo 1024 • Step 2: Append length as an (big-endian) unsigned 128-bit integer • Step 3: Initialize hash buffer to a set of 64-bit integer constants (see text)

SHA-512 COMPRESSION FUNCTION Heart of the algorithm ▪ processing message in 1024-bit blocks ▪ consists of 80 rounds ▪ updating a 512-bit buffer ▪ using a 64-bit value Wt derived from the current message block ▪ and a round constant based on cube root of first 80 prime numbers

SHA-512 ROUND FUNCTION

SHA-512 ROUND FUNCTION

SHA-3 ▪ SHA-1 not yet "broken” ▪ but similar to broken MD5 & SHA-0 ▪ so considered insecure ▪ SHA-2 (esp. SHA-512) seems secure ▪ shares same structure and mathematical operations as predecessors so have concern ▪ NIST announced in 2007 a competition for the SHA-3 next gen NIST hash function ▪ goal to have in place by 2012 but not fixed

SHA-3 REQUIREMENTS ▪ replace SHA-2 with SHA-3 in any use ▪ so use same hash sizes ▪ preserve the online nature of SHA-2 ▪ so must process small blocks (512 / 1024 bits)

▪ evaluation criteria ▪ security close to theoretical max for hash sizes ▪ cost in time & memory ▪ characteristics: such as flexibility & simplicity

SUMMARY ▪ have considered: ▪ hash functions ▪ uses, requirements, security ▪ hash functions based on block ciphers ▪ SHA-1, SHA-2, SHA-3

3-2 Message Authentication.pdf

Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 3-2 Message Authentication.pdf. 3-2 Message Authentication.pdf.

1MB Sizes 0 Downloads 117 Views

Recommend Documents

MESSAGE
your labor from long years of acquiring basic knowledge and skills from your dear Alma Mater. Let me be with you' giving ... ardor and diligence. Don't be scared.

Message Mate
God's grace filled the church and became a bridge of respect and trust ... of what writer Howard Snyder calls kingdom people rather than church people.

Message Mate
The word channels refers to canals or irrigation ditches that run in various ... We can stretch to its breaking point this tension between divine sovereignty and ...

Message Mate
the family of God . . . yet how rare! ... GROWING UP IN GOD'S FAMILY ... copyright © 1985 and Message Mate copyright © 2016 by Charles R. Swindoll, Inc.

Message Mate
Original outline copyright © 1985 and Message Mate copyright © 2016 by Charles .... TEXT: Martin Luther (1483–1546); translated (1852) by Frederick H. Hedge ...

Message Mate
Duplication of copyrighted material for commercial use is strictly prohibited. Committed to Excellence in Communicating Biblical Truth and Its Application. MM07.

Message Mate
Spiritually: Tender — hungry, ready to believe, quick to respond, creative. 2. The Difficult Part: Childishness (Isaiah 30:1 – 2, 8 – 9). We must curb and control ...

Message Mate
After arriving in Jerusalem, Nehemiah's first order of business was to seek silence and ... line the reputation of the promise-keeping God of Israel. Nehemiah had a ... For these and related resources, visit www.insightworld.org/store or call USA ...

message - Calabarzon
Page 1 ... Website: depedcalabarzon.ph Facebook: DepEd Calabarzon. M E S S A G E. The school year is once ... in building a productive society. We salute the ...

Message Mate
leadership or the skills and experiences we bring to the table, we can learn ... of excellent leadership must be placed on a foundation of God's Word and ... service, Nehemiah received devastating news concerning Jerusalem's broken walls ...

Message Mate
Duplication of copyrighted material for commercial use is strictly prohibited. Committed to Excellence in Communicating Biblical Truth and Its Application. MM09.

of 32 - Drive
There was a problem loading this page. Important_Monthly_GK_Current_Affairs_Quizzes_-_A ... CQs)_without_explanation_-_www.ibpsguide.com.PDF.

Accounting (9706/32)
Choose the one you consider correct and record your choice in soft pencil on ... The company proposes a capital reconstruction scheme with the following terms.

of 32
199. Page 3 of 32. Mullen_More_Playful_Interfaces_329899_1_En_9_Chapter_OnlinePDF.pdf. Mullen_More_Playful_Interfaces_329899_1_En_9_Chapter_OnlinePDF.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Mullen_More_Playful_Interfaces_329899_

Google Message Security
This “network effect” automatically identifies and tracks internet protocol (IP) addresses that are issuing attacks such as spam, viruses, denial of service (DoS), etc. As soon as a threat is identified, it is blocked for all Google Message Secur

Google Message Security
Google Docs & Spreadsheets (online document hosting and collaboration),. Google Page Creator (web page creation and publishing), Start Page. (a single ...

Google Message Security
(instant messaging and voice over IP),. Google Docs & Spreadsheets (online document hosting and collaboration),. Google Page Creator (web page creation ...

Accounting (9706/32)
Write your name, Centre number and candidate number on the Answer Sheet in the spaces ... C Ordinary shareholders in a company are members with voting rights. .... $1800 favourable and the materials usage variance is $1000 adverse.

32.pdf
Services such as information retrieval, business planning, basic record keeping, management. assistance, and marketing assistance would greatly benefit the ...

Accounting (9706/32)
Choose the one you consider correct and record your choice in soft pencil on the ... 7 A company is to purchase an unincorporated business by the issue of 120 ...

Accounting (9706/32)
Which entry is shown in the income statement for the year ended 30 September 2014 for the ... A Debenture holders always hold security on the assets of the company. .... 25 A company has a policy of holding inventory equal to next month's ...

1200-08-32
May 1, 2017 - 1200-08-32-.10 Infectious and Hazardous Waste. 1200-08-32-.03 ..... The process of treating water used for dialysis purposes in order to maintain a ..... There shall be evidence of monthly assessment for new and recurrent ...

Accounting (9706/32)
12 In a set of limited company accounts, which item would be included in the statement of changes in equity .... 27 A company sells its products at $2.10 per unit.

1200-08-32
May 1, 2017 - Techniques and systems for identifying, reporting, investigating and controlling infections ..... assessed through quality management activities; ...