Download presentation
Presentation is loading. Please wait.
Published byPosy Barker Modified over 9 years ago
1
Cryptographic Hash Functions Message Authentication Digital Signatures
2
Abstract We will discuss Cryptographic hash functions Message authentication codes –HMAC and CBC-MAC Digital signatures 2
3
Encryption/Decryption Provides message confidentiality. Does it provide message authentication? 3
4
4
5
5
6
6
7
7
8
8 Collision-resistant hash functions can be built from collision-resistant compression functions using Merkle-Damgard construction.
10
Merkle-Damgard Construction m 1 m 2 m 3 m k f f f IV v 0 v 1 v 2 v k … f h(m)
12
12
14
14
15
15
16
16
17
17
18
m = m 1 m 2 m 3 m s f f f IV … f h(m) k Xk X X h k (m) f h k (m) h k (m||m s+1 ) m s+1
20
20
21
Cipher Block Chaining (CBC) 21
22
22
23
Message m MAC k (m) Message m Sig pr (m)
25
MCED PU Bob PR Bob Alice Bob M M SED PU Bob PR Bob Alice Bob Verify Sign Encryption (using RSA): Digital signature (using RSA -1 ): E(S) =M?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.