SlideShare a Scribd company logo
CRYPTOGRAPHY & NETWORK
SECURITY- Cryptographic Hash
Functions
Dr R Jegadeesan Prof-CSE
Jyothishmathi Institute of Technology and Science,
karimnagar
Cryptographic Hash Functions
Syllabus
➢UNIT – III: Cryptographic Hash Functions: Message Authentication, Secure
Hash Algorithm (SHA-512), Message authentication codes: Authentication
requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature
Scheme. Key Management and Distribution: Symmetric Key Distribution Using
Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos,
X.509 Authentication Service, Public – Key Infrastructure
Security Introduction
2
Cryptographic Hash Functions
Aim & Objective :
➢ Our focus is on Internet Security
➢ Consists of message authentication code
➢UNIT – III: Cryptographic Hash Functions: Message Authentication, Secure
Hash Algorithm (SHA-512), Message authentication codes: Authentication
requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature
Scheme. Key Management and Distribution: Symmetric Key Distribution Using
Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos,
X.509 Authentication Service, Public – Key Infrastructure
Security Introduction
3
Cryptographic Hash Functions
Message Authentication
It is a mechanism or service used to verify the
integrity of a message.
Procedure to verify that
- Received message is from alleged source.
- Message has not been altered.
- There is no change in message sequence.
- Message is not delayed or a replay.
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Message Authentication Functions
• Any message authentication or digital signature
mechanism has two levels of functionality.
• At the lower level, there must be some sort of
function that produces an authenticator: a value to
be used to authenticate a message.
• This lower-level function is then used as a primitive
in a higher-level authentication protocol that
enables a receiver to verify the authenticity of a
message.
Cryptographic Hash Functions
Types of Message Authentication Functions
The types of functions that may be used to produce an
authenticator.
These may be grouped into three classes.
• Message encryption: The cipher text of the entire
message serves as its authenticator.
• Message authentication code (MAC): A function of
the message and a secret key that produces a fixed-
length value that serves as the authenticator.
• Hash function: A function that maps a message of
any length into a fixed length hash value, which
serves as the authenticator.
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
Hash Function courses
23
courses available on <www.coursera.org>, and http://neat.aicte-india.org
https://www.coursera.org/
Course 1 : Introduction to Cyber Security
Cyber Security. An introduction to modern information and system protection technology and methods.
Course 2: Cyber security Specialization
-Cyber security Fundamentals. Construction of Secure Systems
Cryptographic Hash Functions
Security Tutorials
24
Tutorial topic wise
➢Cryptography Tutorial – Tutorialspoint www.tutorialspoint.com › cryptography
➢Cryptography Introduction – GeeksforGeeks www.geeksforgeeks.org › cryptography-introduction
➢www.cse.iitm.ac.in › ~chester › courses › slides › 01_Introduction
Cryptographic Hash Functions
Network Security MCQs
25
CNS – MCQs
1.ECB stands for
a. Electronic Control Book b. Electronic Code Book
c. Electronic Cipher Book d. Electronic Cryptography Book
2.The process of transforming plain text to unreadable text.
a. Decryption b. Encryption
c. Network Security d. Information Hiding
3.Plain text is the data after encryption is performed.
a. True b. False c. May be d. Can't say
4.Study of creating a d using encryption and decryption techniques.
a. Cipher b. Cryptography
b. c. Encryption d. Decryption
5. An attack in which the user receives unwanted amount of e-mails.
a. Smurfing b. Denial of service
c. E-mail bombing d. Ping storm
Cryptographic Hash Functions
Security Tutorial
26
CNS –Tutorial Problems:
❑There are many businesses that don’t have a complete inventory of all of the IT assets that they have tied into
their network. This is a massive problem. If you don’t know what all of the assets are on your network, how can
you be sure your network is secure?
❑Many businesses are concerned with “zero day” exploits. These exploits are those unknown issues with security in
programs and systems that have yet to be used against anyone. However, zero day vulnerabilities aren’t the
problem—unpatched known vulnerabilities are the problem.
Cryptographic Hash Functions
CNS Questions
27
Universities & Important Questions:
1. Differentiate MAC and Hash function.
2. Define hash function.
3. What is a Message Authentication Code (MAC)?
4. Define weak-collision resistance.
5. Define strong-collision resistance
6. Define digital Signature.
7. What is the difference between direct and arbitrated digital signature?
8. What is the role of a Key Distribution Centre (KDC) for user authentication?
9. What is the role of a nonce while using an authentication protocol?
10. What is called public key certificate?
Cryptographic Hash Functions
28
Thank you

More Related Content

PPTX
MAC-Message Authentication Codes
PPTX
Feistel cipher
PPTX
Key Management and Distribution
PPTX
Digital signature(Cryptography)
PDF
Network security & cryptography full notes
PPTX
Key management
PPTX
Public Key Cryptography
PPT
Cloud Security
MAC-Message Authentication Codes
Feistel cipher
Key Management and Distribution
Digital signature(Cryptography)
Network security & cryptography full notes
Key management
Public Key Cryptography
Cloud Security

What's hot (20)

PPTX
2 business and it perspective
PPTX
RSA algorithm
PPTX
Symmetric ciphermodel
PPTX
cryptography
PPTX
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
PPTX
Packet sniffers
PPTX
Public Key Cryptosystem
PPTX
Mobile Computing (Part-1)
PPTX
Cryptography
PPTX
kerberos
PPT
Message Authentication Code & HMAC
PPT
Key management.ppt
PPTX
Cryptography and network security
PPTX
CS8792 - Cryptography and Network Security
PPTX
Cryptography
PPTX
key management
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPTX
22ETC15H_Internet of Things(IOT).pptx
PPTX
Kerberos
2 business and it perspective
RSA algorithm
Symmetric ciphermodel
cryptography
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
Packet sniffers
Public Key Cryptosystem
Mobile Computing (Part-1)
Cryptography
kerberos
Message Authentication Code & HMAC
Key management.ppt
Cryptography and network security
CS8792 - Cryptography and Network Security
Cryptography
key management
Cryptography and Network Security William Stallings Lawrie Brown
22ETC15H_Internet of Things(IOT).pptx
Kerberos
Ad

Similar to CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions (20)

PPT
Message authentication and hash function
PDF
Unit 3_Hash function and MD5 working.pdf
DOCX
Cryptography and Network Security Principles and PracticeSeve.docx
PPTX
cryptography and network security cns.pptx
PPTX
Digital Signature Message Digest Network Security
PPTX
Hashes_and_Digital_Signatures_Slides.pptx
PDF
BAIT1103 Chapter 2
PPTX
PPTX
unit 4.pptx of hash function in cryptography
PDF
Cryptographic Hash Functions message auhentication
PDF
Cs8792 cns - unit iv
PDF
Cs8792 cns - unit iv
PDF
Public Key Encryption & Hash functions
PDF
Cns
PPTX
All details of cryptography and all the topics of cryptography was explained
PPTX
Hash Function
PPTX
Unit 3
DOCX
Computer System Security (UNIT IV) For AKTU Lucknow
PPTX
Lecture also solve this ppy slit for next-14.pptx
PPT
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
Message authentication and hash function
Unit 3_Hash function and MD5 working.pdf
Cryptography and Network Security Principles and PracticeSeve.docx
cryptography and network security cns.pptx
Digital Signature Message Digest Network Security
Hashes_and_Digital_Signatures_Slides.pptx
BAIT1103 Chapter 2
unit 4.pptx of hash function in cryptography
Cryptographic Hash Functions message auhentication
Cs8792 cns - unit iv
Cs8792 cns - unit iv
Public Key Encryption & Hash functions
Cns
All details of cryptography and all the topics of cryptography was explained
Hash Function
Unit 3
Computer System Security (UNIT IV) For AKTU Lucknow
Lecture also solve this ppy slit for next-14.pptx
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
Ad

More from Jyothishmathi Institute of Technology and Science Karimnagar (20)

PDF
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
PDF
JAVA PROGRAMMING - The Collections Framework
PDF
JAVA PROGRAMMING- Exception handling - Multithreading
PDF
JAVA PROGRAMMING – Packages - Stream based I/O
PDF
Java programming -Object-Oriented Thinking- Inheritance
PDF
Compiler Design- Machine Independent Optimizations
PDF
PDF
COMPILER DESIGN- Syntax Directed Translation
PDF
COMPILER DESIGN- Introduction & Lexical Analysis:
PPTX
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
PDF
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
PDF
Computer Forensics Working with Windows and DOS Systems
JAVA PROGRAMMING- GUI Programming with Swing - The Swing Buttons
JAVA PROGRAMMING - The Collections Framework
JAVA PROGRAMMING- Exception handling - Multithreading
JAVA PROGRAMMING – Packages - Stream based I/O
Java programming -Object-Oriented Thinking- Inheritance
Compiler Design- Machine Independent Optimizations
COMPILER DESIGN- Syntax Directed Translation
COMPILER DESIGN- Introduction & Lexical Analysis:
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
Computer Forensics Working with Windows and DOS Systems

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Review of recent advances in non-invasive hemoglobin estimation
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Modernizing your data center with Dell and AMD
Chapter 3 Spatial Domain Image Processing.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions

  • 1. CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions Dr R Jegadeesan Prof-CSE Jyothishmathi Institute of Technology and Science, karimnagar
  • 2. Cryptographic Hash Functions Syllabus ➢UNIT – III: Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure Security Introduction 2
  • 3. Cryptographic Hash Functions Aim & Objective : ➢ Our focus is on Internet Security ➢ Consists of message authentication code ➢UNIT – III: Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure Security Introduction 3
  • 5. Message Authentication It is a mechanism or service used to verify the integrity of a message. Procedure to verify that - Received message is from alleged source. - Message has not been altered. - There is no change in message sequence. - Message is not delayed or a replay. Cryptographic Hash Functions
  • 8. Message Authentication Functions • Any message authentication or digital signature mechanism has two levels of functionality. • At the lower level, there must be some sort of function that produces an authenticator: a value to be used to authenticate a message. • This lower-level function is then used as a primitive in a higher-level authentication protocol that enables a receiver to verify the authenticity of a message. Cryptographic Hash Functions
  • 9. Types of Message Authentication Functions The types of functions that may be used to produce an authenticator. These may be grouped into three classes. • Message encryption: The cipher text of the entire message serves as its authenticator. • Message authentication code (MAC): A function of the message and a secret key that produces a fixed- length value that serves as the authenticator. • Hash function: A function that maps a message of any length into a fixed length hash value, which serves as the authenticator. Cryptographic Hash Functions
  • 23. Hash Function courses 23 courses available on <www.coursera.org>, and http://neat.aicte-india.org https://www.coursera.org/ Course 1 : Introduction to Cyber Security Cyber Security. An introduction to modern information and system protection technology and methods. Course 2: Cyber security Specialization -Cyber security Fundamentals. Construction of Secure Systems Cryptographic Hash Functions
  • 24. Security Tutorials 24 Tutorial topic wise ➢Cryptography Tutorial – Tutorialspoint www.tutorialspoint.com › cryptography ➢Cryptography Introduction – GeeksforGeeks www.geeksforgeeks.org › cryptography-introduction ➢www.cse.iitm.ac.in › ~chester › courses › slides › 01_Introduction Cryptographic Hash Functions
  • 25. Network Security MCQs 25 CNS – MCQs 1.ECB stands for a. Electronic Control Book b. Electronic Code Book c. Electronic Cipher Book d. Electronic Cryptography Book 2.The process of transforming plain text to unreadable text. a. Decryption b. Encryption c. Network Security d. Information Hiding 3.Plain text is the data after encryption is performed. a. True b. False c. May be d. Can't say 4.Study of creating a d using encryption and decryption techniques. a. Cipher b. Cryptography b. c. Encryption d. Decryption 5. An attack in which the user receives unwanted amount of e-mails. a. Smurfing b. Denial of service c. E-mail bombing d. Ping storm Cryptographic Hash Functions
  • 26. Security Tutorial 26 CNS –Tutorial Problems: ❑There are many businesses that don’t have a complete inventory of all of the IT assets that they have tied into their network. This is a massive problem. If you don’t know what all of the assets are on your network, how can you be sure your network is secure? ❑Many businesses are concerned with “zero day” exploits. These exploits are those unknown issues with security in programs and systems that have yet to be used against anyone. However, zero day vulnerabilities aren’t the problem—unpatched known vulnerabilities are the problem. Cryptographic Hash Functions
  • 27. CNS Questions 27 Universities & Important Questions: 1. Differentiate MAC and Hash function. 2. Define hash function. 3. What is a Message Authentication Code (MAC)? 4. Define weak-collision resistance. 5. Define strong-collision resistance 6. Define digital Signature. 7. What is the difference between direct and arbitrated digital signature? 8. What is the role of a Key Distribution Centre (KDC) for user authentication? 9. What is the role of a nonce while using an authentication protocol? 10. What is called public key certificate? Cryptographic Hash Functions