350 likes | 541 Views
Cryptographic Hash Functions Message Authentication Digital Signatures. Abstract. We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures. Encryption/Decryption. Provides message confidentiality .
E N D
Cryptographic Hash FunctionsMessage AuthenticationDigital Signatures
Abstract We will discuss • Cryptographic hash functions • Message authentication codes • HMAC and CBC-MAC • Digital signatures
Encryption/Decryption • Provides message confidentiality. • Does it provide message authentication?
Collision-resistant hash functions can be built from collision-resistant compression functions using Merkle-Damgard construction.
Merkle-Damgard Construction m1 m2 m3 mk v0 v1 v2 vk h(m) … f f f f IV
m = m1 m2 m3 ms Xhk(m) h(m) … f f kX f f IV ms+1 f hk(m) hk(m||ms+1)
Message m MACk(m) Message m Sigpr(m)
Encryption (using RSA): Bob Alice PRBob PUBob E C D M M Digital signature (using RSA-1): Bob Alice PRBob PUBob E(S) =M? E S D M Verify Sign