authentication and data integrity
play

Authentication and Data Integrity Authentication with Symmetric - PDF document

Cryptography Authentication and Data Integrity Aims of Authentication Authentication and Data Integrity Authentication with Symmetric Key Encryption Authentication with Hash Cryptography Functions Authentication with MACs School of


  1. Cryptography Authentication and Data Integrity Aims of Authentication Authentication and Data Integrity Authentication with Symmetric Key Encryption Authentication with Hash Cryptography Functions Authentication with MACs School of Engineering and Technology CQUniversity Australia Digital Signatures Prepared by Steven Gordon on 15 Apr 2020, auth.tex, r1850 1

  2. Cryptography Contents Authentication and Data Integrity Aims of Aims of Authentication Authentication Authentication with Symmetric Key Encryption Authentication with Symmetric Key Encryption Authentication with Hash Functions Authentication Authentication with Hash Functions with MACs Digital Signatures Authentication with MACs Digital Signatures 2

  3. Cryptography Attacks on Information Transfer Authentication and Data Integrity 1. Disclosure: encryption Aims of 2. Traffic analysis: encryption Authentication Authentication 3. Masquerade: message authentication with Symmetric Key Encryption 4. Content modification: message authentication Authentication with Hash 5. Sequence modification: message authentication Functions Authentication 6. Timing modification: message authentication with MACs 7. Source repudiation: digital signatures Digital Signatures 8. Destination repudiation: digital signatures 3 We have cover encryption primarily from the perspective of preventing disclosure attacks, i.e. providing confidentiality. Now we will look at pre- venting/detecting masquerade, modification and repudiation attacks using authentication techniques. Note that we consider digital signatures as a form of authentication.

  4. Cryptography Aims of Authentication Authentication and Data Integrity ◮ Receiver wants to verify: Aims of 1. Contents of the message have not been modified ( data Authentication authentication ) Authentication with Symmetric 2. Source of message is who they claim to be ( source Key Encryption authentication ) Authentication ◮ Different approaches available: with Hash Functions ◮ Symmetric Key Encryption Authentication ◮ Hash Functions with MACs ◮ Message Authentication Codes (MACs) Digital Signatures ◮ Public Key Encryption (i.e. Digital Signatures) 4 We will cover these different approaches in the following sections.

  5. Cryptography Contents Authentication and Data Integrity Aims of Aims of Authentication Authentication Authentication with Symmetric Key Encryption Authentication with Symmetric Key Encryption Authentication with Hash Functions Authentication Authentication with Hash Functions with MACs Digital Signatures Authentication with MACs Digital Signatures 5

  6. Cryptography Symmetric Encryption for Authentication Authentication and Data Integrity Aims of Authentication Authentication with Symmetric Key Encryption Authentication Credit: Figure 12.1(a) in Stallings, Cryptography and Network Security , 5th Ed., Pearson 2011 with Hash Functions Authentication with MACs Digital Signatures 6 The figure on slide 6 shows symmetric key encryption used for confiden- tiality. Only B (and A) can recover the plaintext. However in some cases this also provides: • Source Authentication: A is only other user with key; B knows it must have come from A • Data Authentication: successfully decrypted implies data has not been modified The source and data authentication assumes that the decryptor (B) can recognise that the result of the decryption, i.e. the output plaintext, is correct.

  7. Cryptography Recognising Correct Plaintext in English Authentication (question) and Data Integrity Aims of B receives ciphertext (supposedly from A , using shared Authentication secret key K ): Authentication with Symmetric DPNFCTEJLYONCJAEZRCLASJTDQFY Key Encryption B decrypts with key K to obtain plaintext: Authentication with Hash SECURITYANDCRYPTOGRAPHYISFUN Functions Was the plaintext encrypted with key K (and hence sent by Authentication with MACs A )? Is the ciphertext received the same as the ciphertext Digital Signatures sent by A ? 7 The typical answer for above is yes, the plaintext was sent by A and nothing has been modified. This is because the plaintext “makes sense”. Our knowledge of most ciphers (using the English language) is that if the wrong key is used or the ciphertext has been modified, then decrypting will produce an output that does not make sense (not a combination of English words).

  8. Cryptography Recognising Correct Plaintext in English Authentication (question) and Data Integrity Aims of B receives ciphertext (supposedly from A , using shared Authentication secret key K ): Authentication with Symmetric QEFPFPQEBTOLKDJBPPXDBPLOOVX Key Encryption B decrypts with key K to obtain plaintext: Authentication with Hash FTUEUEFTQIDAZSYQEEMSQEADDKM Functions Was the plaintext encrypted with key K (and hence sent by Authentication with MACs A )? Is the ciphertext received the same as the ciphertext Digital Signatures sent by A ? 8 Based on the previous argument, the answer is no. Or more precise, either the plaintext was not sent by A , or the ciphertext was modified along the way. This is because the plaintext makes no sense, and we were expected it to do so.

  9. Cryptography Recognising Correct Plaintext in Binary Authentication (question) and Data Integrity Aims of B receives ciphertext (supposedly from A , using shared Authentication secret key K ): Authentication with Symmetric 0110100110101101010110111000010 Key Encryption B decrypts with key K to obtain plaintext: Authentication with Hash 0101110100001101001010100101110 Functions Was the plaintext encrypted with key K (and hence sent by Authentication with MACs A )? Is the ciphertext received the same as the ciphertext Digital Signatures sent by A ? 9 This is harder. We cannot make a decision without further understanding of the expected structure of the plaintext. What are the plaintext bits supposed to represent? A field in a packet header? A portion of a binary file? A random key? Without further information, the receiver does not know if the plaintext is correct or not. And therefore does not know if the ciphertext was sent by A and has not been modified.

  10. Cryptography Recognising Correct Plaintext Authentication and Data Integrity ◮ Many forms of information as plaintext can be Aims of recognised at correct Authentication ◮ However not all, and often not automatically Authentication with Symmetric Key Encryption ◮ Authentication should be possible without decryptor Authentication having to know context of the information being with Hash Functions transferred Authentication ◮ Authentication purely via symmetric key encryption is with MACs Digital Signatures insufficient ◮ Solutions: ◮ Add structure to information, such as error detecting code ◮ Use other forms of authentication, e.g. MAC 10 We will see some of the alternatives in the following sections.

  11. Cryptography Contents Authentication and Data Integrity Aims of Aims of Authentication Authentication Authentication with Symmetric Key Encryption Authentication with Symmetric Key Encryption Authentication with Hash Functions Authentication Authentication with Hash Functions with MACs Digital Signatures Authentication with MACs Digital Signatures 11

  12. Cryptography Authentication by Hash and then Encrypt Authentication and Data Integrity Aims of Authentication Authentication with Symmetric Key Encryption Authentication with Hash Functions Credit: Figure in Stallings, Cryptography and Network Security , 5th Ed., Pearson 2011 Authentication with MACs Digital Signatures 12 The figure on slide 12 shows a scheme where the hash function is used to add structure to the message. When the receiver decrypts, they will be able to determine if the plaintext is correct by comparing the hash of the message component with the stored hash value. This is one method of addressing the problem of using just symmetric key encryption on its own for authentication. This scheme provides confidentiality of the message and authentication.

  13. Cryptography Authentication by Encrypting a Hash Authentication and Data Integrity Aims of Authentication Authentication with Symmetric Key Encryption Authentication with Hash Functions Authentication Credit: Figure in Stallings, Cryptography and Network Security , 5th Ed., Pearson 2011 with MACs Digital Signatures 13 The figure on slide 13 shows a different scheme where only the hash value is encrypted. The receiver can verify that nothing has been changed. This scheme provides authentication, but does not attempt to provide confidentiality. This is useful in reducing any computation overhead when confidentiality is not required.

  14. Cryptography Attack of Authentication by Encrypting a Hash Authentication (exercise) and Data Integrity Aims of If a hash function did not have the Second Preimage Authentication Resistant property, then demonstrate an attack on the Authentication with Symmetric scheme in The figure on slide 13. Key Encryption Authentication with Hash Functions Authentication with MACs Digital Signatures 14

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend