mes messa sage ge aut uthe hent ntica ication tion cod
play

Mes Messa sage ge Aut uthe hent ntica ication tion Cod Codes - PowerPoint PPT Presentation

Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Mes Messa sage ge Aut uthe hent ntica ication tion Cod Codes es Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare


  1. Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Mes Messa sage ge Aut uthe hent ntica ication tion Cod Codes es Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaway’s “Introduction to Modern Cryptography” course. Sharif University Introduction to Modern Cryptography Spring 2015 1 / 80

  2. Outline  Message Authentication  Message Authentication Code (MAC)  PRFs as good MACs  Constructing MACs  Birthday Attack and Security Bounds  HMAC  Universal Hashing and Message Authentication Sharif University Introduction to Modern Cryptography Spring 2015 2 / 80

  3. Message Authentication Sharif University Introduction to Modern Cryptography Spring 2015 3 / 80

  4. Integrity and authenticity Sharif University Introduction to Modern Cryptography Spring 2015 4 / 80

  5. Integrity and authenticity example Sharif University Introduction to Modern Cryptography Spring 2015 5 / 80

  6. Medical databases Sharif University Introduction to Modern Cryptography Spring 2015 6 / 80

  7. Does privacy provide authenticity? Sharif University Introduction to Modern Cryptography Spring 2015 7 / 80

  8. Counterexample: OTP Sharif University Introduction to Modern Cryptography Spring 2015 8 / 80

  9. Adding redundacy Sharif University Introduction to Modern Cryptography Spring 2015 9 / 80

  10. What went wrong? Sharif University Introduction to Modern Cryptography Spring 2015 10 / 80

  11. Message Authentication Code (MAC) Sharif University Introduction to Modern Cryptography Spring 2015 11 / 80

  12. Message authentication codes Sharif University Introduction to Modern Cryptography Spring 2015 12 / 80

  13. Example Sharif University Introduction to Modern Cryptography Spring 2015 13 / 80

  14. Security: What the adversary gets Sharif University Introduction to Modern Cryptography Spring 2015 14 / 80

  15. Security: Key-recovery Sharif University Introduction to Modern Cryptography Spring 2015 15 / 80

  16. Security: Forgery Sharif University Introduction to Modern Cryptography Spring 2015 16 / 80

  17. uf-cma adversaries Sharif University Introduction to Modern Cryptography Spring 2015 17 / 80

  18. uf-cma adversaries Sharif University Introduction to Modern Cryptography Spring 2015 18 / 80

  19. UF-CMA Sharif University Introduction to Modern Cryptography Spring 2015 19 / 80

  20. Definition: UF-CMA Sharif University Introduction to Modern Cryptography Spring 2015 20 / 80

  21. The measure of success Sharif University Introduction to Modern Cryptography Spring 2015 21 / 80

  22. MAC security Sharif University Introduction to Modern Cryptography Spring 2015 22 / 80

  23. Tag lengths Sharif University Introduction to Modern Cryptography Spring 2015 23 / 80

  24. Example 1 Sharif University Introduction to Modern Cryptography Spring 2015 24 / 80

  25. Example 1 Sharif University Introduction to Modern Cryptography Spring 2015 25 / 80

  26. Example 1 Sharif University Introduction to Modern Cryptography Spring 2015 26 / 80

  27. Example 1 Sharif University Introduction to Modern Cryptography Spring 2015 27 / 80

  28. Example 1 Sharif University Introduction to Modern Cryptography Spring 2015 28 / 80

  29. Example 1 Sharif University Introduction to Modern Cryptography Spring 2015 29 / 80

  30. Example 2 Sharif University Introduction to Modern Cryptography Spring 2015 30 / 80

  31. Example 2 Sharif University Introduction to Modern Cryptography Spring 2015 31 / 80

  32. Example 2 Sharif University Introduction to Modern Cryptography Spring 2015 32 / 80

  33. Attack on Example 2 Sharif University Introduction to Modern Cryptography Spring 2015 33 / 80

  34. PRFs as good MACs Sharif University Introduction to Modern Cryptography Spring 2015 34 / 80

  35. Any PRF is a MAC Sharif University Introduction to Modern Cryptography Spring 2015 35 / 80

  36. Intuition for why PRFs are good MACs Sharif University Introduction to Modern Cryptography Spring 2015 36 / 80

  37. Random functions are good MACs Sharif University Introduction to Modern Cryptography Spring 2015 37 / 80

  38. Random functions are good MACs Sharif University Introduction to Modern Cryptography Spring 2015 38 / 80

  39. PRFs are nearly as good MACs as random functions Sharif University Introduction to Modern Cryptography Spring 2015 39 / 80

  40. PRFs are good MACs Sharif University Introduction to Modern Cryptography Spring 2015 40 / 80

  41. Games for proof Sharif University Introduction to Modern Cryptography Spring 2015 41 / 80

  42. Adversary B Sharif University Introduction to Modern Cryptography Spring 2015 42 / 80

  43. Analysis Sharif University Introduction to Modern Cryptography Spring 2015 43 / 80

  44. Proof of Claim Sharif University Introduction to Modern Cryptography Spring 2015 44 / 80

  45. Proof of Claim Sharif University Introduction to Modern Cryptography Spring 2015 45 / 80

  46. Proof of Claim Sharif University Introduction to Modern Cryptography Spring 2015 46 / 80

  47. Constructing MACs Sharif University Introduction to Modern Cryptography Spring 2015 47 / 80

  48. Basic CBC MAC Sharif University Introduction to Modern Cryptography Spring 2015 48 / 80

  49. Splicing attack on basic CBC MAC Sharif University Introduction to Modern Cryptography Spring 2015 49 / 80

  50. Preventing the splicing attack Sharif University Introduction to Modern Cryptography Spring 2015 50 / 80

  51. ECBC MAC Sharif University Introduction to Modern Cryptography Spring 2015 51 / 80

  52. Birthday Attack and Security Bounds Sharif University Introduction to Modern Cryptography Spring 2015 52 / 80

  53. Birthday attacks on MACs Sharif University Introduction to Modern Cryptography Spring 2015 53 / 80

  54. The birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 54 / 80

  55. Internal collisions Sharif University Introduction to Modern Cryptography Spring 2015 55 / 80

  56. Exploiting internal collisions to forge Sharif University Introduction to Modern Cryptography Spring 2015 56 / 80

  57. Exploiting internal collisions to forge Sharif University Introduction to Modern Cryptography Spring 2015 57 / 80

  58. Finding internal collisions Sharif University Introduction to Modern Cryptography Spring 2015 58 / 80

  59. Birthday attack on 3-restricted basic CBC MAC T Sharif University Introduction to Modern Cryptography Spring 2015 59 / 80

  60. Truncation Sharif University Introduction to Modern Cryptography Spring 2015 60 / 80

  61. Security of basic CBC MAC Sharif University Introduction to Modern Cryptography Spring 2015 61 / 80

  62. Security of basic CBC MAC Sharif University Introduction to Modern Cryptography Spring 2015 62 / 80

  63. Security of ECBC Sharif University Introduction to Modern Cryptography Spring 2015 63 / 80

  64. Security of ECBC Sharif University Introduction to Modern Cryptography Spring 2015 64 / 80

  65. Non-full messages Sharif University Introduction to Modern Cryptography Spring 2015 65 / 80

  66. Non-full messages Sharif University Introduction to Modern Cryptography Spring 2015 66 / 80

  67. HMAC Sharif University Introduction to Modern Cryptography Spring 2015 67 / 80

  68. MACing with hash functions Sharif University Introduction to Modern Cryptography Spring 2015 68 / 80

  69. Extension attack Sharif University Introduction to Modern Cryptography Spring 2015 69 / 80

  70. Extension attack Sharif University Introduction to Modern Cryptography Spring 2015 70 / 80

  71. HMAC [BCK96] Sharif University Introduction to Modern Cryptography Spring 2015 71 / 80

  72. HMAC Sharif University Introduction to Modern Cryptography Spring 2015 72 / 80

  73. HMAC Security Sharif University Introduction to Modern Cryptography Spring 2015 73 / 80

  74. Universal Hashing and Message Authentication Sharif University Introduction to Modern Cryptography Spring 2015 74 / 80

  75. Paradigms for MACing Sharif University Introduction to Modern Cryptography Spring 2015 75 / 80

  76. AU Families Sharif University Introduction to Modern Cryptography Spring 2015 76 / 80

  77. NH [BHKKR] Sharif University Introduction to Modern Cryptography Spring 2015 77 / 80

  78. From AU to MAC Sharif University Introduction to Modern Cryptography Spring 2015 78 / 80

  79. Performance Sharif University Introduction to Modern Cryptography Spring 2015 79 / 80

  80. Questions? Sharif University Introduction to Modern Cryptography Spring 2015 80 / 80

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend