Professional Documents
Culture Documents
Cns
Cns
Authentication Requirements
▪In a communication network, the
following attacks can be identified:
1. Disclosure: Release of message contents to any
person or process not possessing the appropriate
cryptographic key.
2. Traffic analysis: Discovery of the pattern of
traffic between parties. In a connection-oriented
application, the frequency and duration of
connections could be determined. In either a
connection-oriented or connectionless
environment, the number and length of messages
between parties could be determined.
3. Masquerade: Insertion of messages into the
network from a fraudulent source. This includes
the creation of messages by an opponent that are
appearing to come from an authorized entity.
Also included are fraudulent acknowledgments of
message receipt or nonreceipt by someone other
than the message recipient.
4. Content modification: Changes to the contents
of a message, including insertion, deletion,
transposition, and modification.
5. Sequence modification: Any modification to a
sequence of messages between parties, including
insertion, deletion, and reordering.
6. Timing modification: Delay or replay of messages. In
a connection-oriented application, an entire session or
sequence of messages could be a replay of some
previous valid session, or individual messages in the
sequence could be delayed or replayed.
7. Source repudiation: Denial of transmission of
message by source
8. Destination repudiation: Denial of receipt of message
by destination
□ brute-force attacks
□ cryptanalysis.
▪Brute-Force Attacks
The nature of brute-force attacks differs
somewhat for hash functions and
MACs.
▪Hash Functions
□ The strength of a hash function against brute-force
attacks depends solely on the length of the hash
code produced by the algorithm.
□ There are three desirable properties:
1. One-way
2. Weak collision resistance
3. Strong collision resistance
▪Message Authentication Codes
□ A brute-force attack on a MAC is a more difficult
because it requires known message-MAC pairs.
□ To attack a hash code, perform in the
following way. Given a fixed message x with n-bit
hash code h = H(x), a brute-force method of
finding a collision is to pick a random bit string y
and check if H(y) = H(x). The attacker can do this
repeatedly off line.
□ security property of a MAC algorithm, can be
expressed as follows:
□ Off line attack on MAC depends on the key size
also.
□ Computation resistance: Given one or more
message-MAC pairs,it is computationally
infeasible to compute any message-MAC pair (x,
CK( x)) for any new input x ≠xi.
□ There are two attacks possible here:
1. Attack the key space
2. attack the MAC value
▪Cryptanalysis
□ cryptanalytic attacks on hash functions and MAC
algorithms tries to exploit some property of the
algorithm to perform some attack other than an
exhaustive search as in brute force attack.
Hash Algorithms
▪MD5
▪ SHA-1
MD5
MD5
64
160
Message block and hash
buffer
▪ Operates on words
▪ Each block consists of sixteen, 32-bits (512 bits)
words.
▪ 160-bit buffer is used to store intermediate and final
results.
▪ There are 5, 32 bit registers (=160 bits) named
A,B,C,D,E
Initialise the Hash buffer
Disadv:
Double encryption complexity
DIGITAL SIGNATURE STANDARD
(DSS)
▪NIST published, the DSS
▪It is one of the schemes of Digital Signature.
▪Uses the SHA hash algorithm
▪DSS is the standard, DSA is the algorithm.
▪Creates a 320 bit signature.
▪Was originally proposed in 1991 and
revised in 1993
DSS Approach