CST433 M4 Ktunotes.in
CST433 M4 Ktunotes.in
CST433 M4 Ktunotes.in
PART 1:
Hash functions –
● Security requirements,
● Secure Hash Algorithm (SHA-512).
Hash functions:
● A hash function H accepts a variable-length block of data M as input and
produces a fixed-size hash value h = H(M).
● A “good” hash function has the property of applying the function to a large
set of inputs will produce outputs that are evenly distributed and random
● The principal object of a hash function is data integrity.
● A change to any bit or bits in M results, with high probability, in a change to
the hash code.
● The kind of hash function needed for security applications is referred to as
cryptographic hash function.
● The final requirement dictates that the authentication algorithm should not be
weaker with respect to certain parts or bits of the message than others.
● If this were not the case, then an opponent who had M and MAC(K, M) could
attempt variations on M at the known “weak spots” with a likelihood of early
success at producing a new message that matched the old tags.
● HMAC has been issued as RFC 2104, has been chosen as the
mandatory-to-implement MAC for IP security, and is used in other Internet
protocols, such as SSL.
HMAC Design Objectives
PART 3:
Digital signatures –
● Attacks,
● Forgeries,
● Requirements,
● Direct vs Arbitrated digital signatures,
● RSA digital signature,
● ElGamal digital signature,
● Digital Signature Standard (DSS).
🌟🌟🌟