Information Security and Management 11

Slides:



Advertisements
Similar presentations
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Advertisements

Sri Lanka Institute of Information Technology
Outline Project 1 Hash functions and its application on security Modern cryptographic hash functions and message digest –MD5 –SHA.
PIITMadhumita Chatterjee Security 1 Hashes and Message Digests.
Hash functions a hash function produces a fingerprint of some file/message/data h = H(M)  condenses a variable-length message M  to a fixed-sized fingerprint.
Hashes and Message Digest Hash is also called message digest One-way function: d=h(m) but no h’(d)=m –Cannot find the message given a digest Cannot find.
Cryptography and Network Security Hash Algorithms.
Authentication & MD5 Jen-Chang Liu, Fall 2005 Adapted from lecture slides by Lawrie Brown.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Pertemuan 09 Hash and Message Digest Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Authentication & digital signature Jen-Chang Liu Adapted from lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
1 Cryptography and Network Security (Various Hash Algorithms) Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Changed by Somesh Jha)
Network Security Sorina Persa Group 3250 Group 3250.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 2: Message Authentication Anish Arora CSE5473 Introduction to Network Security.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Message Authentication Requirements Disclosure Release of message contents to any person or process not possessing the appropriate cryptographic key Traffic.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Message Authentication and Hash Functions Chapter 11.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Chapter 4 Message Authentication MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Hash Algorithms see similarities in the evolution of hash functions & block ciphers –increasing power of brute-force attacks –leading to evolution in algorithms.
Chapter 11 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Message Authentication and Hash Functions K. U. Khimani Asst. Prof. IT Dept. VVP Engineering College.
MESSAGE AUTHENTICATION and HASH FUNCTIONS - Chapter 11 MESSAGE AUTHENTICATION and HASH FUNCTIONS - Chapter 11 Masquerade – message insertion, fraud, ACK.
1 Message Authentication and Hash Functions G 何采宭.
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Cryptography and Network Security
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Hash Algorithms Ch 12 of Cryptography and Network Security - Third Edition by William Stallings Modified from lecture slides by Lawrie Brown CIM3681 :
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Information and Network Security Dr. Hadi AL Saadi Message Authentication and Hash Functions.
Message Authentication Code
Chapter 12 – Hash Algorithms
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
Message Authentication and Hash Functions
Message Authentication and Hash Functions
Message Authentication
CRYPTOGRAPHY & NETWORK SECURITY
Presentation transcript:

Information Security and Management 11 Information Security and Management 11. Message Authentication and Hash Functions Chih-Hung Wang Sep. 2008

Message Authentication Authentication Requirement Possible attacks on the network Disclosure Traffic analysis Masquerade Content modification Sequence modification Timing modification Source repudiation Destination repudiation

Authentication Functions Message encryption The ciphertext of the entire message serves as its authenticator Message authentication code (MAC) A public function of the message and a secret key that produces a fix-length value that serves as the authenticator Hash Function A public function that maps a message of any length into a fixed-length hash value, which serves as the authenticator

Message Encryption (A) Conventional encryption: confidentiality and authentication

Message Encryption (B) Public-key encryption: confidentiality

Message Encryption (C) Public-key encryption: authentication and signature

Message Encryption (D) Public-key encryption: confidentiality, authentication And signature

Table 11.1 (1)

Table 11.1 (2)

Error Control Append an error-detecting code (frame check sequence, FCS) or checksum to each message before encryption Internal error control

Error Control External error control An opponent can construct messages with valid error-control codes

Example of TCP Segment The receiver can be assured of the proper sequence because an attacker cannot successfully alter the sequence number

TCP-level Encryption

MAC (1) The use of a secret key to generate a small fixed-size block of data That is appended to the message A MAC function is similar to encryption. One difference is that MAC algorithm need not be reversible It is less vulnerable to being broken than encryption

MAC (2) Three situations in which a message authentication code is used The same message is broadcast to a number of destinations It is cheaper and more reliable to have only one destination responsible for monitoring authenticity An exchange: one side has a heavy load and cannot afford the time to decrypt all incoming message. Message being chosen at random for checking Authentication of a computer program in plaintext is an attractive service The computer program can be executed without having to decrypt it every time

MAC (3) Other rationales For some applications, it may not be concern to keep message secret, but it is important to authenticate message SNMPv3:separates the functions of confidentiality and authentication Separation of authentication and confidentiality functions affords architectural flexibility Perform authentication at the application level but to provide confidentiality at a lower level A user may wish to prolong the period of protection beyond the time of reception and yet allow processing the message content

MAC (4) Message authentication

MAC (5) Message authentication and confidentiality; Authentication tied to plaintext

MAC (6) Message authentication and confidentiality; Authentication tied to ciphertext

Basic Uses of MAC (Table 11.2)

MAC Function A MAC function is similar to encryption. One difference is that the MAC algorithm need not be reversible, as it must for decryption. In general, the MAC function is a many-to-one function. If an n-bit MAC is used, then there are 2n possible MACs, whereas there are N possible messages with N>>2n.

Requirements for MACs (1)

Requirements for MACs (2) Taking into account the types of attacks Need the MAC to satisfy the following: Knowing a message and MAC, is infeasible to find another message with same MAC If we assume that the opponent does not know k but does have access to the MAC function and can present messages for MAC generation, then the opponent could try various messages until finding one that matches a given MAC. MACs should be uniformly distributed. A brute-force method would require, on average, 2(n-1) attempts. The MAC should not be weaker with respect to certain parts or bits of the message than others.

Using Symmetric Ciphers for MACs Can use any block cipher chaining mode and use final block as a MAC Data Authentication Algorithm (DAA) is a widely used MAC based on DES-CBC using IV=0 and zero-pad of final block encrypt message using DES in CBC mode and send just the final block as the MAC or the leftmost M bits (16≤M≤64) of final block but final MAC is now too small for security

DAC Data Authentication Code (FIPS PUB 113 and ANSI standard X9.17)

Hash Function Definition A hash function accepts a variable-size message M as input and produces a fixed-size hash code H(M) Sometime called a message digest Hash Algorithm MD5 RFC 1321 developed by Ron Rivist at MIT Secure Hash Algorithm (SHA) FIPS PUB 180 in 1993 (NIST) 180-1 in 1995 FISP: Federal Information Processing Standard

Hash Function PlaintextM Message Digest Hash value H(M)

Requirements of Hash H can be applied to a block of data of any size H produces a fixed-length output H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical For any given code h, it is computationally infeasible to find x such that H(x)=h. This is sometimes referred to in the literature as the one-way property For any given block x, it is computationally infeasible to find yx with H(y)=H(x). This is sometimes referred to as weak collision resistance It is computationally infeasible to find any pair (x,y) such that H(x)=H(y). This is sometimes referred to as strong collision resistance.

Requirements of Hash m1 m2 H(m1) H(m2) It is difficult to find m1 and m2 (m1 m2) such that H(m1)=H(m2)

Basic Use of Hash (A)

Basic Use of Hash (B)

Basic Use of Hash (C)

Security of Hash Functions For a code of length n One-way: 2n Weak collision resistance: 2n Strong collision resistance: 2n/2

The Famous Hash Functions MD5 SHA

SHA-1 Logic Append padding bits: pad message so its length is 448 mod 512 Append length: append a 64-bit length value to message Initialize MD buffer: initialise 5-word (160-bit) buffer (A,B,C,D,E) to (67452301,efcdab89,98badcfe,10325476,c3d2e1f0) Process message in 512-bit (16-word) blocks: expand 16 words into 80 words by mixing & shifting use 4 rounds of 20 bit operations on message block & buffer add output to input to form new buffer value Output: output hash value is the final buffer value

SHA-1 Compression Function Each round has 20 steps which replaces the 5 buffer words thus: (A,B,C,D,E) <-(E+f(t,B,C,D)+S5(A)+Wt+Kt),A,S30(B),C,D) A,B,C,D,E refer to the 5 words of the buffer t is the step number, 0 t 79 f(t,B,C,D) is nonlinear function for round Wt is derived from the message block Kt is an additive constant value Sk is circular left shift by k bits

SHA-1 Compression Function

SHA-1 Compression Function

Function Summarized

80-word Input Sequence Wt=S1(Wt-16Wt-14 Wt-8 Wt-3)

Comparison of SHA-1 and MD5 Brute force attack for SHA-1 is harder (160 vs 128 bits for MD5) SHA-1 is not vulnerable to any known attacks (compared to MD4/5) ?? (Speed) SHA-1 is a little slower than MD5 (80 vs 64 steps) Both designed is simple and compact SHA-1 uses big endian scheme (MD5 uses little endian scheme)

Revised Secure Hash Standard NIST have issued a revision FIPS 180-2 and adds 3 additional hash algorithms: SHA-256, SHA-384, SHA-512. Designed for compatibility with increased security provided by the AES cipher Structure & detail are similar to SHA-1 and hence analysis should be similar.

Comparison of SHA Properties