SlideShare a Scribd company logo
SRI KRISHNA COLLEGE OF ENGINEERING AND TECHNOLOGY
Kuniamuthur, Coimbatore, Tamilnadu, India
An Autonomous Institution, Affiliated to Anna University,
Accredited by NAAC with “A” Grade & Accredited by NBA (CSE, ECE, IT, MECH ,EEE, CIVIL& MCT)
COURSE MATERIALMATERIAL
Course : 20EC603 – Fundamentals of Network Security
Module - 2: Public Key Cryptography and authentication
requirements
Topics : Message authentication code and Hash
functions
www.skcet.ac.in
2
Outline
 Cryptographic Hash Functions
 Applications
 Simple hash functions
 Requirements and security
 Hash functions based on Cipher Block Chaining
 Secure Hash Algorithm (SHA)
3
Hash Function
 A hash function H accepts a
variable-length block of data M
as input and produces a fixed-
size hash value h = H(M).
 A “good” hash function has the
property that the results of
applying a change to any bit or
bits in M results, with high
probability, in a change to the
hash code.
4
Input-Output behaviour of hash functions
Alice was beginning to get very tired of
sitting by her sister on the bank, and have
nothing to do.
I am not a crook
I am not a cook H
H
H DFDC349A
FB93E283
A3F4439B
Message Message
digest
5
Requirements for hash functions
1. Can be applied to any length of message M.
2. Produces fixed-length output h.
3. It is easy to compute h=H(M) for any message M.
4. Given hash value h is infeasible to find y such that (H(y) = h)
• One-way property (In other words, given a fingerprint, we
cannot derive a matching message).
5. For given block x, it is computationally infeasible to find
y ≠ x with H(y) = H(x)
• Weak collision resistance
6. It is computationally infeasible to find messages m1 and m2 with
H(m1) = H(m2)
• Strong collision resistance
6
Simple Hash Function
 The input (message, file, etc.) is viewed as a sequence of n-bit
blocks.
 The input is processed one block at a time in an iterative fashion
to produce an n-bit hash function.
 One of the simplest hash functions is the bit-by-bit exclusive-OR
(XOR) of every block.
𝑪𝒊 = 𝒃𝒊𝟏 ⊕ 𝒃𝒊𝟐 ⊕ … ⊕ 𝒃𝒊𝒎
Where,
𝐶𝑖 = ith bit of the hash code 1 ≤ i ≤ n
m = number of n-bit blocks in the input
𝑏𝑖𝑗 = ith bit in jth block

More Related Content

PPTX
unit 4.pptx of hash function in cryptography
PPTX
PDF
Public Key Encryption & Hash functions
PDF
Hash Function.pdf
PPT
Network security cryptographic hash function
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PDF
IRJET - Hash Functions and its Security for Snags
PPTX
Ch_07 (1).pptx
unit 4.pptx of hash function in cryptography
Public Key Encryption & Hash functions
Hash Function.pdf
Network security cryptographic hash function
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
IRJET - Hash Functions and its Security for Snags
Ch_07 (1).pptx

Similar to 2.15 Message Authentication Code and Hash Functions.pptx (20)

PPTX
All details of cryptography and all the topics of cryptography was explained
PPT
secure hash function for authentication in CNS
PPT
ch11_hashing Function.ppthdhdjdjdidjebehehejeueu
PDF
18CS2005 Cryptography and Network Security
PPTX
Information and data security cryptographic hash functions
PPT
SHA New Revised Version - SHA-512 Syllabus Module 3
PDF
HASH FUNCTIONS.pdf
DOCX
Cryptography and netwrk securityunit 4
PPTX
Blockchain Technology, Cryptography and cryptocurrencies Module2.pptx
PPTX
Hashfunction
PPTX
Hashfunction
PPTX
Hashfunction
PPTX
Hash function
PPTX
Hashfunction
PPTX
Hashfunction
PPTX
Hashfunction
PPT
NSC_Unit-III_final.ppt
PDF
Concepts of BlockChain explained very well
PPTX
Lecture also solve this ppy slit for next-14.pptx
DOCX
Cryptography and Network Security Principles and Practice.docx
All details of cryptography and all the topics of cryptography was explained
secure hash function for authentication in CNS
ch11_hashing Function.ppthdhdjdjdidjebehehejeueu
18CS2005 Cryptography and Network Security
Information and data security cryptographic hash functions
SHA New Revised Version - SHA-512 Syllabus Module 3
HASH FUNCTIONS.pdf
Cryptography and netwrk securityunit 4
Blockchain Technology, Cryptography and cryptocurrencies Module2.pptx
Hashfunction
Hashfunction
Hashfunction
Hash function
Hashfunction
Hashfunction
Hashfunction
NSC_Unit-III_final.ppt
Concepts of BlockChain explained very well
Lecture also solve this ppy slit for next-14.pptx
Cryptography and Network Security Principles and Practice.docx
Ad

More from girilogu2 (11)

PPTX
Decision tree algorithm in Machine Learning
PPTX
Edge Detection using 4 bit MAC on Basys3 FPGA
PPTX
L11 Inner Product Space Applied Mathematics
PPTX
L14 Projection and Gram Schmidt applied Mathematics
PPTX
L15 Least square method in applied mathematics
PPTX
2.11 Diffie -hellman exchange.pptx
PPT
2.2 Product-architecture.ppt
PPT
2.1 Product_Specifications.ppt
PPTX
VLSI Bluetooth baseband controller.pptx
PPTX
2.13 Inroductory idea of elliptic curve cryptography.pptx
PPTX
2.10 Security of RSA.pptx
Decision tree algorithm in Machine Learning
Edge Detection using 4 bit MAC on Basys3 FPGA
L11 Inner Product Space Applied Mathematics
L14 Projection and Gram Schmidt applied Mathematics
L15 Least square method in applied mathematics
2.11 Diffie -hellman exchange.pptx
2.2 Product-architecture.ppt
2.1 Product_Specifications.ppt
VLSI Bluetooth baseband controller.pptx
2.13 Inroductory idea of elliptic curve cryptography.pptx
2.10 Security of RSA.pptx
Ad

Recently uploaded (20)

PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
R24 SURVEYING LAB MANUAL for civil enggi
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Sustainable Sites - Green Building Construction
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
PPT on Performance Review to get promotions
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Foundation to blockchain - A guide to Blockchain Tech
Model Code of Practice - Construction Work - 21102022 .pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
UNIT-1 - COAL BASED THERMAL POWER PLANTS
R24 SURVEYING LAB MANUAL for civil enggi
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Internet of Things (IOT) - A guide to understanding
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Sustainable Sites - Green Building Construction
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT on Performance Review to get promotions
Operating System & Kernel Study Guide-1 - converted.pdf
573137875-Attendance-Management-System-original
Geodesy 1.pptx...............................................
UNIT 4 Total Quality Management .pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
additive manufacturing of ss316l using mig welding
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx

2.15 Message Authentication Code and Hash Functions.pptx

  • 1. SRI KRISHNA COLLEGE OF ENGINEERING AND TECHNOLOGY Kuniamuthur, Coimbatore, Tamilnadu, India An Autonomous Institution, Affiliated to Anna University, Accredited by NAAC with “A” Grade & Accredited by NBA (CSE, ECE, IT, MECH ,EEE, CIVIL& MCT) COURSE MATERIALMATERIAL Course : 20EC603 – Fundamentals of Network Security Module - 2: Public Key Cryptography and authentication requirements Topics : Message authentication code and Hash functions www.skcet.ac.in
  • 2. 2 Outline  Cryptographic Hash Functions  Applications  Simple hash functions  Requirements and security  Hash functions based on Cipher Block Chaining  Secure Hash Algorithm (SHA)
  • 3. 3 Hash Function  A hash function H accepts a variable-length block of data M as input and produces a fixed- size hash value h = H(M).  A “good” hash function has the property that the results of applying a change to any bit or bits in M results, with high probability, in a change to the hash code.
  • 4. 4 Input-Output behaviour of hash functions Alice was beginning to get very tired of sitting by her sister on the bank, and have nothing to do. I am not a crook I am not a cook H H H DFDC349A FB93E283 A3F4439B Message Message digest
  • 5. 5 Requirements for hash functions 1. Can be applied to any length of message M. 2. Produces fixed-length output h. 3. It is easy to compute h=H(M) for any message M. 4. Given hash value h is infeasible to find y such that (H(y) = h) • One-way property (In other words, given a fingerprint, we cannot derive a matching message). 5. For given block x, it is computationally infeasible to find y ≠ x with H(y) = H(x) • Weak collision resistance 6. It is computationally infeasible to find messages m1 and m2 with H(m1) = H(m2) • Strong collision resistance
  • 6. 6 Simple Hash Function  The input (message, file, etc.) is viewed as a sequence of n-bit blocks.  The input is processed one block at a time in an iterative fashion to produce an n-bit hash function.  One of the simplest hash functions is the bit-by-bit exclusive-OR (XOR) of every block. 𝑪𝒊 = 𝒃𝒊𝟏 ⊕ 𝒃𝒊𝟐 ⊕ … ⊕ 𝒃𝒊𝒎 Where, 𝐶𝑖 = ith bit of the hash code 1 ≤ i ≤ n m = number of n-bit blocks in the input 𝑏𝑖𝑗 = ith bit in jth block

Editor's Notes

  • #3: X.800 and RFC 2828 International Telecommunication Union (ITU)