CNS U-4 Notes
CNS U-4 Notes
CNS U-4 Notes
Hash Functions:
condenses arbitrary message to fixed size
h = H(M)
collision resistance
hence value 2m/2 determines strength of hash code against brute-force attacks
opponent generates 2m/2 variations x’ of x, all with essentially the same meaning,
and saves them
two sets of messages are compared to find pair with same hash (probability > 0.5
by birthday paradox)
have user sign the valid message, then substitute the forgery which will have a
valid signature
P(N,i) = prob(i randomly selected values from 1..N have at least one match)
P(N,2) = 1/N
P(N,i+1) = P(N,i)+(1-P(N,i))(i/N)
2005 results on security of SHA-1 raised concerns on its use in future applications
Revised Secure Hash Standard:
designed for compatibility with increased security provided by the AES cipher
SHA Versions:
SHA-512 Overview:
consists of 80 rounds
Message Authentication:
message authentication is concerned with:
message encryption
disclosure
traffic analysis
masquerade
content modification
sequence modification
timing modification
source repudiation
destination repudiation
MAC = C(K,M)
MAC Properties:
MAC = CK(M)
to a fixed-sized authenticator
is a many-to-one function
1. knowing a message and MAC, is infeasible to find another message with same
MAC
2. MACs should be uniformly distributed
Security of MACs:
HMAC:
overhead is just 3 more hash block calculations than the message needs alone
any hash function can be used
birthday attack (but since keyed would need to observe a very large number of
messages)
CMAC:
attacks
key-only attack
total break
selective forgery
existential forgery
digital signature made by sender signing entire message or hash with private-key
signature is:(S1,S2)
V1 = am mod q
signature is valid if V1 = V2
V1 = 1014 mod 19 = 16
FIPS 186-2 (2000) includes alternative RSA & elliptic curve signature variants
is a public-key technique
DSS vs RSA Signatures:
choose g = h(p-1)/q
w = s-1 mod q
u2= (rw)mod q
Key Distribution:
often secure system failure due to a break in the key distribution scheme
if A & B have communicated previously can use previous key to encrypt a new
key
if A & B have secure communications with a third party C, C can relay key
between A & B
Key Hierarchy:
temporary key
master key
hierarchies of KDC’s required for large networks, but must trust each other
use of automatic key distribution on behalf of users, but must trust system
rationale
performance
backward compatibility
public announcement
public-key authority
public-key certificates
Public Announcement:
eg. append PGP keys to email messages or post to news groups or email list
Public-Key Authority:
then users interact with directory to obtain any desired public key securely
usually with other info such as period of validity, rights of use etc
enable verification of any certificate from one CA by users of all other CAs in hierarchy