Message authentication and cryptographic hashing
2MMC10 Cryptology Andreas H¨ ulsing September 20, 2018
- A. H¨
ulsing 2MMC10 Cryptology 1 / 12
Message authentication and cryptographic hashing 2MMC10 Cryptology - - PowerPoint PPT Presentation
Message authentication and cryptographic hashing 2MMC10 Cryptology Andreas H ulsing September 20, 2018 A. H ulsing 2MMC10 Cryptology 1 / 12 Message authentication Sometimes we want more than secrecy! Acknowledgement of receipt,
ulsing 2MMC10 Cryptology 1 / 12
ulsing 2MMC10 Cryptology 2 / 12
ulsing 2MMC10 Cryptology 2 / 12
ulsing 2MMC10 Cryptology 2 / 12
ulsing 2MMC10 Cryptology 2 / 12
1 Upon input 1n, the algorithm Gen outputs a key k. The set
2 The algorithm Mac receives as input a key k ∈ K and a
3 The algorithm Vrfy receives as input a key k ∈ K, message
4 Correctness: For every n, every k ←
ulsing 2MMC10 Cryptology 3 / 12
1 k ← Gen(1n) 2 (m, t) ← AMack(·)(1n). Let {mi}q
3 if (Vrfyk(m, t) := 1, and m ∈ {mi}q
4 else return 0.
ulsing 2MMC10 Cryptology 4 / 12
ulsing 2MMC10 Cryptology 5 / 12
ulsing 2MMC10 Cryptology 6 / 12
ulsing 2MMC10 Cryptology 7 / 12
ulsing 2MMC10 Cryptology 7 / 12
ulsing 2MMC10 Cryptology 8 / 12
1 Denote m = m1, . . . , mℓ where each mi is of
2 For i = 1 to ℓ, set ti ← Fk(ti−1 ⊕ mi). 3 Output tℓ.
ulsing 2MMC10 Cryptology 9 / 12
ulsing 2MMC10 Cryptology 10 / 12
ulsing 2MMC10 Cryptology 10 / 12
ulsing 2MMC10 Cryptology 11 / 12
ulsing 2MMC10 Cryptology 11 / 12
ulsing 2MMC10 Cryptology 12 / 12
ulsing 2MMC10 Cryptology 12 / 12
ulsing 2MMC10 Cryptology 12 / 12
ulsing 2MMC10 Cryptology 12 / 12
ulsing 2MMC10 Cryptology 12 / 12