MAC: Message Authentication Code

17
MAC: Message Authentication Code CS 465 Last Updated: Sep 18, 2013

description

CS 465. MAC: Message Authentication Code. Last Updated : Sep 18, 2013. What Assurrances are Provided by Symmetric Encryption?. Authentication? Confidentiality? Integrity? Non-repudiation?. Bit Flipping Attacks (Block Cipher). Bit Flipping Attacks (Stream Cipher). - PowerPoint PPT Presentation

Transcript of MAC: Message Authentication Code

Page 1: MAC: Message Authentication Code

MAC: Message Authentication Code

CS 465

Last Updated: Sep 18, 2013

Page 2: MAC: Message Authentication Code

• Authentication?

• Confidentiality?

• Integrity?

• Non-repudiation?

What Assurrances are Provided by Symmetric Encryption?

Page 3: MAC: Message Authentication Code

Bit Flipping Attacks (Block Cipher)

Page 4: MAC: Message Authentication Code

• Plaintext: ACCT_NO:123-45-6789 ADD:100• Ciphertext:

Bit Flipping Attacks (Stream Cipher)

15b1206b7efa68b9 89 c87357507e3a27a138ca dc b2a1bb f8 eebee5

Page 5: MAC: Message Authentication Code

• Assure that the message has not been altered

• Assure the source of the message is authentic

• Optional – Timeliness of the message

Goals of Message Authentication

Page 6: MAC: Message Authentication Code

• Authentication of encrypted messageso Include an error-detection code in plaintext message

• Authentication of plaintext messageso Authentication without confidentialityo Attach a key-based error-detection code to plaintext message

Message Authentication:Ciphertext vs. Plaintext

Page 7: MAC: Message Authentication Code

Dear B

YU,

Than

k yo

u so

muc

h fo

r

offer

ing

such

an a

wesom

e

com

pute

r

secu

rity

cour

se.

Sinc

erel

y,

Joe

Stud

ent

Message Authentication Code (MAC)

This

mes

sage

real

ly is

from

me

and

hasn

’t be

en

mod

ified

.Key

MAC

Alg

orith

m

Dear B

YU,

Than

k yo

u so

muc

h fo

r

offer

ing

such

an a

wesom

e

com

pute

r

secu

rity

cour

se.

Sinc

erel

y,

Joe

Stud

ent

Page 8: MAC: Message Authentication Code

Message Authentication Code (MAC)

Source: Network Security Essentials (Stallings)

Page 9: MAC: Message Authentication Code

MAC Creation with Block Cipher

Page 10: MAC: Message Authentication Code

1.CBC-MACo Use CBC mode and a block ciphero Expensive

2.Hash the message and encrypt the digest

Three Ways to Implement a MAC

Source: Network Security Essentials (Stallings)

Page 11: MAC: Message Authentication Code

1.CBC-MAC2.Hash the message and encrypt the digest3.Hash the message along with a shared key

o MAC generated using hashing is known as an HMAC

Three Ways to Implement a MAC

Source: Network Security Essentials (Stallings)

Page 12: MAC: Message Authentication Code

• Cryptographers recommend against this kind of HMAC using modern hash functions

• Vulnerable to a message extension attack• An example of an implementation weaknesses in the

algorithm

Design Flaw!

Page 13: MAC: Message Authentication Code

Iterative Hash Function

• Popular hash functions (MD5, SHA-1) use an iterative implementation technique known as the Merkle-Damgård construction

Page 14: MAC: Message Authentication Code
Page 15: MAC: Message Authentication Code

Alice and Bob• Alice and Bob share a key K

• Alice sends message M1 to Bob such that Bob

knows it came from Aliceo Alice computes H(K || M1) = d1

o Alice sends M1 and d1 to Bob

• Bob verifies the messageo Bob computes H(K || M1) = d2 and compares d1 to d2. If

they match, the message came from Alice.o Or did it????

Page 16: MAC: Message Authentication Code

HMAC• Because of the message extension attack vulnerability,

the government standard HMAC algorithm guards against this threato FIPS 198o RFC 2104

Page 17: MAC: Message Authentication Code

HMAC• H(K || H(K || M))