8 Ch0
8 Ch0
Authentication Requirements
Authentication Requirements
• Message authentication
• A procedure to verify that received messages come from the alleged
source and have not been altered
• Message authentication may also verify sequencing and timeliness
• Digital signature
• An authentication technique that also includes measures to counter
repudiation by the source
Authentication Functions
• Message authentication or digital signature mechanism can be viewed as having
two levels
• At lower level: there must be some sort of functions producing an authenticator – a value
to be used to authenticate a message
• This lower level functions is used as primitive in a higher level authentication protocol
Message Encryption
• Symmetric encryption can serve as authenticator
• In addition, B is assured that the message was generated by A. Why? The message must have
come from A, because A is the only other party that possesses K and therefore the only other party with the
information necessary to construct ciphertext that can be decrypted with K.
• both sender and receiver use private key to encrypt/decrypt ensures both authentication and
confidentiality.
• We could, for example, append an error-detecting code, also known as a frame check sequence
(FCS) or checksum, to each message before encryption, as illustrated in Figure (a). A prepares a
plaintext message M and then provides this as input to a function F that produces an FCS. The
FCS is appended to M and the entire block is then encrypted.
• At the destination, B decrypts the incoming block and treats the results as a message
with an appended FCS. B applies the same function F to attempt to reproduce
the FCS. If the calculated FCS is equal to the incoming FCS, then the message is considered aut
hentic.
Authentication Functions
• Assurances:
• Message has not been altered
• Message is from the alleged sender
• Message sequence is unaltered (requires internal sequencing)
• In both these cases, two separate keys are needed, each of which is shared by the sender and the receiver.
• In the first case (Figure b), the MAC is calculated with the message as input and is then concatenated to
the message. The entire block is then encrypted.
Hash Function
• One-way hash function
• Converts a variable size message M into fixed size hash code
H(M) (Sometimes called a message digest)
• Unlike the MAC, a hash code does not use a key but is a
function only of the input message
• Provides message integrity