ISEP / Fakulta Elektrotecknika 1 Project Of Telecommunication Subject: Describe following “ MAC - Message Authentication Code " modes: Describe following.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Digital Signatures and Hash Functions. Digital Signatures.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J.D. Tygar Research Topics in Security in the context.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Practical Techniques for Searches on Encrypted Data Yongdae Kim Written by Song, Wagner, Perrig.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Message Authentication Requirements Disclosure Release of message contents to any person or process not possessing the appropriate cryptographic key Traffic.
Cryptography, Authentication and Digital Signatures
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2015 Nitesh Saxena.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
CMSC 414 Computer and Network Security Lecture 5 Jonathan Katz.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
CS426Fall 2010/Lecture 61 Computer Security CS 426 Lecture 6 Cryptography: Message Authentication Code.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
A Quick Tour of Cryptographic Primitives Anupam Datta CMU Fall A: Foundations of Security and Privacy.
Lecture 2: Introduction to Cryptography
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 12.
Cryptographic Hash Functions
Cryptographic Hash Function
e-Health Platform End 2 End encryption
CSCE 715: Network Systems Security
Chapter 5: The Art of Ensuring Integrity
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Cryptographic Hash Functions
Cryptography Lecture 13.
MAC: Message Authentication Code
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Security of Wireless Sensor Networks
DISSERTATION ON CRYPTOGRAPHY.
Chapter 3 - Public-Key Cryptography & Authentication
Counter With Cipher Block Chaining-MAC
Cipher-Based MAC Network Security.
Presentation transcript:

ISEP / Fakulta Elektrotecknika 1 Project Of Telecommunication Subject: Describe following “ MAC - Message Authentication Code " modes: Describe following “ MAC - Message Authentication Code " modes: MAC, CBC-MAC, HMAC, OMACv1, OMACv2, PMAC Hakim Roqai ChaouiRaphael Morel

ISEP / Fakulta Elektrotecknika2 The choice of the subject Cryptography is an interdisciplinary subject present on several fields Cryptography is an interdisciplinary subject present on several fields It is the main tool used in computer and network security for such things as access control and information confidentiality It is the main tool used in computer and network security for such things as access control and information confidentiality It finds many applications that touch everyday life: the security of ATM cards, computer passwords … It finds many applications that touch everyday life: the security of ATM cards, computer passwords …

ISEP / Fakulta Elektrotecknika3 The choice of the subject It seems to be interessant to learn: - a new method of cryptography like the MAC algorithms - block cipher algorithms like OMAC, CBC-MAC and PMAC - block cipher algorithms like OMAC, CBC-MAC and PMAC - cryptographic hash functions like HMAC

ISEP / Fakulta Elektrotecknika4 How do we proceed? First we used internet in order to know what the project dealt with. Our sources were from Google, wikipedia and other universities internet sites First we used internet in order to know what the project dealt with. Our sources were from Google, wikipedia and other universities internet sites After that, we focused on the real subject and began to understand the different methods of cryptography After that, we focused on the real subject and began to understand the different methods of cryptography And finally we made the final report And finally we made the final report

ISEP / Fakulta Elektrotecknika5 What we have learnt MAC is a short piece of information used to authenticate a message MAC is a short piece of information used to authenticate a message A MAC algorithm accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs a MAC (sometimes known as a tag) A MAC algorithm accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs a MAC (sometimes known as a tag) The sender and the receiver of the message must have the same key The sender and the receiver of the message must have the same key

ISEP / Fakulta Elektrotecknika6 What is a block cipher ? A block cipher consists of two paired algorithms, one for encryption, E, and another for decryption, E-1 A block cipher consists of two paired algorithms, one for encryption, E, and another for decryption, E-1 Both algorithms accept two inputs: an input block of size n bits and a key of size k bits, yielding an n-bit output block Both algorithms accept two inputs: an input block of size n bits and a key of size k bits, yielding an n-bit output block For any one fixed key, decryption is the Inverse function of encryption, so that For any one fixed key, decryption is the Inverse function of encryption, so that

ISEP / Fakulta Elektrotecknika7 What is a block cipher ? Encryption: Decryption:

ISEP / Fakulta Elektrotecknika8 Block cipher algorithms OMAC, CBC-MAC and PMAC use block ciphers mode to create a message authentication code OMAC, CBC-MAC and PMAC use block ciphers mode to create a message authentication code They can save code space in very tiny embedded systems like for instance smart cards or nodes in cars They can save code space in very tiny embedded systems like for instance smart cards or nodes in cars

ISEP / Fakulta Elektrotecknika9 What is a cryptographic hash function ? In cryptography, a cryptographic hash function is a hash function with certain additional security properties  to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity

ISEP / Fakulta Elektrotecknika10 What is a cryptographic hash function ? A hash function takes a long string (or message) of any length as input and produces a fixed length string as output

ISEP / Fakulta Elektrotecknika11 HMAC:keyed-hash message authentication code HMAC is a type of MAC calculated using a cryptographic hash function in combination with a secret key HMAC is a type of MAC calculated using a cryptographic hash function in combination with a secret key HMAC may be used to simultaneously verify both the data integrity and the authenticity of a message HMAC may be used to simultaneously verify both the data integrity and the authenticity of a message The cryptographic strength of the HMAC depends upon the cryptographic strength of the underlying hash function and on the size and quality of the key The cryptographic strength of the HMAC depends upon the cryptographic strength of the underlying hash function and on the size and quality of the key

ISEP / Fakulta Elektrotecknika12 Conclusion We lost time on “ Mac address ” instead of MAC – Message Authentication Code We lost time on “ Mac address ” instead of MAC – Message Authentication Code Difficulty to make research in English Difficulty to make research in English We enjoyed to discover codes we have never learnt We enjoyed to discover codes we have never learnt Both works at the university and at home Both works at the university and at home Thank you for your hospitality and your happiness Thank you for your hospitality and your happiness