/
Data  Integrity:  Applications of Cryptographic Data  Integrity:  Applications of Cryptographic

Data Integrity: Applications of Cryptographic - PowerPoint Presentation

mindeeli
mindeeli . @mindeeli
Follow
343 views
Uploaded On 2020-06-23

Data Integrity: Applications of Cryptographic - PPT Presentation

Hash Functions 1272010 1 Data Integrity Message Authentication Code MAC Cryptographic hash function hKM with two inputs Secret key K Message M Message integrity with MAC Sequence of messages transmitted over insecure channel ID: 784069

integrity hash data mac hash integrity mac data message 2010 encrypted transmitted cryptographic key compute function signed authentication transmit

Share:

Link:

Embed:

Download Presentation from below link

Download The PPT/PDF document "Data Integrity: Applications of Crypto..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Data Integrity: Applications of Cryptographic Hash Functions

12/7/2010

1

Data Integrity

Slide2

Message Authentication Code (MAC)

Cryptographic hash function h(K,M) with two inputs:Secret key KMessage M

Message integrity with MACSequence of messages transmitted over insecure channel

Secret key K shared by sender and recipient

Sender computes MAC c = h(K,M) and transmits it along with message M

Receiver recomputes MAC from received message and compares it with received MACAttacker cannot compute correct MAC for a forged messageMore efficient than signing each messageSecret key can be sent in a separate encrypted and signed message

12/7/2010

Data Integrity

2

M

c

sent message

Compute

c = h(K,M)

Compute

d

= h(K,M′)Accept ifd = c′

M

c′

received message

Slide3

HMACBuilding a MAC from a cryptographic hash function is not immediate

Because of the iterative construction of standard hash functions, the following MAC constructions are insecure:h(K

M)h(M

K)

h(K

MK)HMAC provides a secure construction:h(K  Ah(K  B M))

A and B are constantsInternet standard used, e.g., in IPSECHMAC security is the same as that of the underlying cryptographic hash function

12/7/2010

Data Integrity

3

Slide4

Securing a Communication Channel

Assuring both integrity and confidentiality of messages transmitted over an insecure channel

Sign and encrypt

The encrypted pair (message, signature) is transmitted

MAC and encrypt

The encrypted pair (message, MAC) is transmitted

Secret key for MAC can be sent in separate messageMore efficient than sign and encrypt

MAC is shorter and faster to compute than signature and verificationAlternatively, signing or applying MAC could be done on encrypted message

12/7/2010

Data Integrity

4

M

sig

M

MAC

encrypted

encrypted

Slide5

Hash ChainRepeated cryptographic hashing starting from a random value r

xn = r

xi = h(xi

+

1

) for i = n-1 … 1Sequence x1 x

2 … xn is pseudo-random

ApplicationsOne-time passwords

Incremental micropayments (PayWord

)Key property for security is

preimage resistance of hash function

5

x2

x

3

x

4

x5

x

6

x

1

hash

reveal

12/7/2010

Data Integrity

Slide6

Validation ChainValidation chain

over a sequence of plaintextsp1, p

2 , …, p

n

x

n+1= 0xi = h(p

i || x

i+1

) for i = n … 1Incremental stream authentication [

Gennaro

Rohatgi]

transmit signed x1 transmit packets (p1,

x2), (p2, x3), …, (p

n-1,

xn), (pn,

xn+

1)each packet contains the hash of the next packetthe integrity of the first hash implies the integrity of the restany prefix of the stream is signed and cannot be repudiatedconstant overhead (one hash per plaintext)one signature (slow), n hash computations (fast)

offline method, requires reliable transmission

6

p1, x

2

p

2

,

x

3

p

3

,

x

4

p

4

,

x

5

p

5

,

0

sig

,

x

1

12/7/2010

Data Integrity

Slide7

Hash TreeBalanced binary tree defining a hierarchical hashing scheme over a set of items

a

= h(x

1

, x

2)b = h(

x3, x

4)

c = h(

a, b)

The root hash is a hierarchical digest of entire set[Merkle]7

x

2

x

1

x

4

x

3

x

5

x

7

x

6

a

b

c

x

8

12/7/2010

Data Integrity

Slide8

Hash Tree AuthenticationAssumptions

Collision resistant hash functionRoot hash is known

Membership proof of an item

path from the item to the root (L/R sequence) plus hash

values of sibling nodes

logarithmic size and verificationtimeExampleg =

h(

h(a, h

(x

3,

x

4)), d)The proof of

x4 is the sequence [(

x3, L

), (a

, L), (

d, R)]8

x

2

x

1

x

4

x

3

x

5

x

7

x

6

a

b

e

f

c

d

g

x

8

12/7/2010

Data Integrity

Slide9

Stream Authentication with Packet LossesSequence of plaintexts to be transmitted

p1, p2

, …, pn

Build a hash tree on top of items (

i

, pi)Transmit the signed root hashFor each item pi, transmit packet (i, p

i, proof(i,pi))

Logarithmic space overhead and verification time per packetLost packets do not prevent authentication of future packets

Off-line scheme

9

12/7/2010

Data Integrity