Cryptography and Network Security Chapter 12



Similar documents
Cryptography and Network Security Chapter 11. Fourth Edition by William Stallings

Authentication requirement Authentication function MAC Hash function Security of

Message Authentication

Message Authentication Codes

Cryptography and Network Security Chapter 11

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Message Authentication Codes. Lecture Outline

Cryptographic Hash Functions Message Authentication Digital Signatures

Computer Security: Principles and Practice

Public Key Cryptography Overview

Designing Hash functions. Reviewing... Message Authentication Codes. and message authentication codes. We have seen how to authenticate messages:

Message authentication and. digital signatures

Symmetric Crypto MAC. Pierre-Alain Fouque

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

How To Attack A Block Cipher With A Key Key (Dk) And A Key (K) On A 2Dns) On An Ipa (Ipa) On The Ipa 2Ds (Ipb) On Pcode)

IT Networks & Security CERT Luncheon Series: Cryptography

Authentication, digital signatures, PRNG

HASH CODE BASED SECURITY IN CLOUD COMPUTING

Network Security. Modes of Operation. Steven M. Bellovin February 3,

lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal

Recommendation for Applications Using Approved Hash Algorithms

Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

CSE/EE 461 Lecture 23

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Hash Functions. Integrity checks

Cryptography and Network Security Chapter 3

Fundamentals of Computer Security

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

CSCI-E46: Applied Network Security. Class 1: Introduction Cryptography Primer 1/26/16 CSCI-E46: APPLIED NETWORK SECURITY, SPRING

Cryptography and Network Security Digital Signature

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

SECURITY IN NETWORKS

Cryptography and Network Security Chapter 9

Recommendation for Cryptographic Key Generation

Table of Contents. Bibliografische Informationen digitalisiert durch

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

RSA BSAFE. Crypto-C Micro Edition for MFP SW Platform (psos) Security Policy. Version , October 22, 2012

Network Security CS 5490/6490 Fall 2015 Lecture Notes 8/26/2015

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Chapter 7: Network security

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Cryptography and Network Security Chapter 15

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CSC474/574 - Information Systems Security: Homework1 Solutions Sketch

Message authentication

Authenticated encryption

CIS433/533 - Computer and Network Security Cryptography

Lecture 9 - Message Authentication Codes

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs

SHA3 WHERE WE VE BEEN WHERE WE RE GOING

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

The Misuse of RC4 in Microsoft Word and Excel

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Developing and Investigation of a New Technique Combining Message Authentication and Encryption

An Introduction to Cryptography as Applied to the Smart Grid

IPsec Details 1 / 43. IPsec Details

A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR

Talk announcement please consider attending!

Introduction to Computer Security

Security Protocols/Standards


Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Archived NIST Technical Series Publication

Outline. CSc 466/566. Computer Security. 8 : Cryptography Digital Signatures. Digital Signatures. Digital Signatures... Christian Collberg

MAC. SKE in Practice. Lecture 5

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Cryptography & Digital Signatures

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Network Security Essentials Chapter 7

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Chapter 6 Electronic Mail Security

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13

Client Server Registration Protocol

The Keyed-Hash Message Authentication Code (HMAC)

PGP - Pretty Good Privacy

CS155. Cryptography Overview

What is network security?

Network Security. HIT Shimrit Tzur-David

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Lecture 9: Application of Cryptography

Overview of Symmetric Encryption

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Transport Level Security

PGP from: Cryptography and Network Security

Provable-Security Analysis of Authenticated Encryption in Kerberos

Cryptography and Network Security

EXAM questions for the course TTM Information Security June Part 1

Introduction to Cryptography CS 355

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

CRYPTOGRAPHY AND NETWORK SECURITY

Transcription:

Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 12 Message Authentication Codes At cats' green on the Sunday he took the message from the inside of the pillar and added Peter Moran's name to the two names already printed there in the "Brontosaur" code. The message now read: Leviathan to Dragon: Martin Hillman, Trevor Allan, Peter Moran: observe and tail. What was the good of it John hardly knew. He felt better, he felt that at last he had made an attack on Peter Moran instead of waiting passively and effecting no retaliation. Besides, what was the use of being in possession of the key to the codes if he never took advantage of it? Talking to Strange Men, Ruth Rendell Outline will consider: message authentication requirements message authentication using encryption MACs HMAC authentication using a hash function CMAC authentication using a block cipher GCM authentication using a block cipher PRNG using Hash Functions and MACs Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) three alternative approaches used: hash functions (see Ch 11) message encryption message authentication codes (MACs( MACs)

Symmetric Message Encryption encryption can also provides authentication if symmetric encryption is used then: receiver knows sender must have created it since only sender and receiver know key used know content cannot have been altered if message has suitable structure,, redundancy or a checksum to detect any changes Message Authentication Code (MAC) generated by an algorithm that creates a small fixed-sized block depending on both message and some key like encryption, but need not be reversible appended to message as a digest / tag receiver performs same computation on message and checks it matches the MAC provides assurance that message is unaltered and comes from sender esp. useful if message can be any bitpattern Message Authentication Codes a MAC is a cryptographic checksum MAC=C K (M) condenses a variable-length length message M using a secret key K to a fixed-sized authenticator is a many-to to-one one function potentially many messages have same MAC but finding these needs to be very difficult Message Authentication Codes as shown the MAC provides authentication can also use encryption for secrecy generally use separate keys for each can compute MAC either before or after encryption is generally regarded as better done before why use a MAC? sometimes only authentication is needed sometimes need authentication to persist longer than the encryption (eg( eg.. archival use) protection for arbitrary bitpattern plaintexts a MAC is not a digital signature (repudiation)

Uses of MAC Authenticated Encryption simultaneously protect confidentiality and authenticity of communications often required but usually separate approaches Hash-then then-encrypt: encrypt: E(K, (M H(M)) MAC-then then-encrypt: encrypt: E(K2, (M MAC(K1, M)) Encrypt-then then-mac: (C=E(K2, M), T=MAC(K1, C) Encrypt-and and-mac: (C=E(K2, M), T=MAC(K1, M) decryption / verification straightforward vulnerabilities with all, without good design Requirements for MACs taking into account the types of attacks need the MAC to satisfy the following: 1. knowing a message and MAC, is infeasible to find another message with same MAC 2. MACs should be uniformly distributed 3. MAC should depend equally on all bits of the message similar to hash function properties (preimage( resistance, second preimage resistance, collision resistance) Security of MACs like block ciphers have: brute-force attacks exploiting strong collision resistance hash have cost 2 m / 2 128-bit hash looks vulnerable, 160-bits better MACs with known message-mac pairs can either attack keyspace (cf key search) or MAC at least 128-bit MAC is needed for security

Security of MACs cryptanalytic attacks exploit structure like block ciphers want brute-force attacks to be the best alternative more variety of MACs so harder to generalize about cryptanalysis Keyed Hash Functions as MACs want a MAC based on a hash function because hash functions are generally faster crypto hash function code is widely available hash includes a key along with message original proposal: KeyedHash = Hash(Key Message) some weaknesses were found with this eventually led to development of HMAC HMAC Design Objectives use, without modifications, hash functions allow for easy replaceability of embedded hash function preserve original performance of hash function without significant degradation use and handle keys in a simple way. have well understood cryptographic analysis of authentication mechanism strength HMAC specified as Internet standard RFC2104 uses hash function on the message: HMAC K (M)= Hash[(K + XOR opad) Hash[(K + XOR ipad) M)]] where K + is the key, zero-padded out to size opad, ipad are specified padding constants (50% bits in common), repeated to pad out to size overhead is just 3 more hash calculations than the message needs alone any hash function can be used eg. MD5, SHA-1, RIPEMD-160, Whirlpool

ipad = (00110110)* HMAC Overview HMAC Precom- putation opad = (01011100)* HMAC Security proved security of HMAC relates to that of the underlying hash algorithm attacking HMAC requires either: brute force attack on key used birthday attack (but since keyed, would need to observe a very large number of messages) choose hash function used based on speed versus security constraints Using Symmetric Ciphers for MACs can use any block cipher chaining mode and use final block as a MAC Data Authentication Algorithm (DAA) is a widely used MAC based on DES-CBC using IV=0 and zero-pad of final block encrypt message using DES in CBC mode and send just the final block as the MAC or the leftmost M bits (16 M 64) 64) of final block but final MAC is now too small for security

Data Authentication Algorithm CMAC previously saw the DAA (CBC-MAC) widely used in government and industry but has message size limitation can overcome using 2 keys and padding thus forming the Cipher-based Message Authentication Code (CMAC) adopted by NIST SP800-38B N.B. DAA K (X) = DAA K (X (X XOR DAA K (X))) CMAC Overview K 1 = L x L = E (K,0 n ) use GF(2 blocksize ) K 2 = L x 2 Counter with Cipher Block Chaining-Message Authentication Code (CCM) NIST standard SP 800-38C for WiFi variation of encrypt-and and-mac approach algorithmic ingredients AES encryption algorithm CTR mode of operation CMAC authentication algorithm single key used for both encryption & MAC

Galois/Counter Mode (GCM) CCM Operation NIST standard SP 800-38D, parallelizable message is encrypted in variant of CTR ciphertext multiplied with key H and length over GF(2 128 ) to generate authenticator have GMAC MAC-only mode also uses two functions: GHASH - a keyed hash function GCTR - CTR mode with incremented counter GCM Functions GCM Mode Overview

GCM Functions Pseudorandom Number Generation (PRNG) Using Hash Functions and MACs essential elements of PRNG are seed value deterministic algorithm seed must be known only as needed can base PRNG on encryption algorithm (Chs( 7 & 10) hash function (ISO18031 & NIST SP 800-90) MAC (NIST SP 800-90) PRNG using a Hash Function hash PRNG from SP800-90 and ISO18031 take seed V repeatedly add 1 hash V use n-bits n of hash as random value secure if good hash used PRNG using a MAC MAC PRNGs in SP800-90, IEEE 802.11i, TLS use key input based on last hash in various ways