HMAC and its Design Objectives

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Information Security Principles & Applications Topic 4: Message Authentication 虞慧群
Hash and MAC Algorithms
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
PULIC –KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION.
Cryptography and Network Security
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Message Authentication Requirements Disclosure Release of message contents to any person or process not possessing the appropriate cryptographic key Traffic.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Chapter 21 Public-Key Cryptography and Message Authentication.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Hash and Mac Algorithms. Contents Hash Functions Secure Hash Algorithm HMAC.
CSCE 815 Network Security Lecture 8 SHA Operation and Kerberos.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Message Authentication Code
Chapter 12 – Hash Algorithms
UNIT 2 Public-key Cryptography And Message Authentication
Public-Key Cryptography and Message Authentication
Cryptography and Network Security
Computer Communication & Networks
Cryptographic Hash Function
B. R. Chandavarkar CSE Dept., NITK Surathkal
Introduction Used for communication to verify
Message Authentication Code
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Cryptography and Network Security Sixth Edition by William Stallings.
NET 311 Information Security
Cryptography and Network Security
Cryptography and Network Security Chapter 16
MAC: Message Authentication Code
Cryptography and Network Security
Hash and MAC Algorithms
Security Of Wireless Sensor Networks
NETW4005 COMPUTER SECURITY - A
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Security of Wireless Sensor Networks
Message Authentication Code
Triple DES Network Security.
Basics Of Symmetric Encryption
Cryptography and Network Security
Pseudorandom Numbers Network Security.
One-way Hash Function Network Security.
Hash Function Requirements
Security Mechanisms Network Security.
CRYPTOGRAPHY & NETWORK SECURITY
The Secure Hash Function (SHA)
Counter With Cipher Block Chaining-MAC
Symmetric Key Distribution
Advanced Encryption Standard
Digital Signature Standard (DSS)
Cipher-Based MAC Network Security.
Elect. Codebook, Cipher Block Chaining
A Model For Network Security
Message Authentication
Simple Hash Functions Network Security.
Presentation transcript:

HMAC and its Design Objectives Network Security

HMAC and its Design Objectives Objectives of the Topic After completing this topic, a student will be able to explain design objectives of hash-based message authentication code(HMAC).

HMAC and its Design Objectives Figures and material in this topic have been adapted from “Network Security Essentials : Applications and Standards”, 2014, by William Stallings.

HMAC and its Design Objectives Message authentication is a procedure that allows communicating parties to verify that received messages, file, document, or other collection of data are authentic.

HMAC and its Design Objectives Message Authentication Code (MAC) is a technique that involves the use of a secret key to generate a small block of data, known as a message authentication code , that is appended to the message.

HMAC and its Design Objectives

HMAC and its Design Objectives There has been a growing interest in developing a MAC derived from a cryptographic hash code, such as SHA-1. The motivations are:

HMAC and its Design Objectives 1. Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES. 2. Library code for cryptographic hash functions is widely available.

HMAC and its Design Objectives A hash function such as SHA was not designed for use as a MAC and cannot be used directly for that purpose, because it does not rely on a secret key.

HMAC and its Design Objectives Among the proposals for the incorporation of a secret key into an existing hash algorithm, HMAC is the approach that has received the most support.

HMAC and its Design Objectives HMAC has been issued as RFC 2104, as a NIST standard (FIPS 198). as mandatory-to- implement MAC for IP Security. Also used in Transport Layer Security (TLS) and Secure Electronic Transaction (SET).

HMAC and its Design Objectives HMAC Design Objectives: RFC 2104 lists the following design objectives for HMAC.

HMAC and its Design Objectives 1. To use, without modifications, available hash functions. In particular, hash functions that perform well in software, and for which code is freely and widely available.

HMAC and its Design Objectives 2. To allow for easy replaceability of the embedded hash function in case faster or more secure hash functions are found or required.

HMAC and its Design Objectives 3. To preserve the original performance of the hash function without incurring a significant degradation. 4. To use and handle keys in a simple way.

HMAC and its Design Objectives 5. To have a well-understood cryptographic analysis of the strength of the authentication mechanism based on reasonable assumptions on the embedded hash function.

HMAC and its Design Objectives The first two objectives are important to the acceptability of HMAC. HMAC treats the hash function as a “black box.” This has two benefits.

HMAC and its Design Objectives First, an existing implementation of a hash function can be used as a module in implementing HMAC.

HMAC and its Design Objectives Second, if it is ever desired to replace a given hash function in an HMAC implementation, all that is required is to remove the existing hash function module and drop in the new module.

HMAC and its Design Objectives The last design objective in the preceding list is, in fact, the main advantage of HMAC over other proposed hash-based schemes. End