SlideShare a Scribd company logo
Hashed message authentication code - Network
Message Authentication
• message authentication is concerned with:
• protecting the integrity of a message
• validating identity of originator
• non-repudiation of origin (dispute resolution)
• will consider the security requirements
• then three alternative functions used:
• hash function (see Ch 11)
• message encryption
• message authentication code (MAC)
Message Authentication Codes
• as shown the MAC provides authentication
• can also use encryption for secrecy
• generally use separate keys for each
• can compute MAC either before or after encryption
• is generally regarded as better done before
• why use a MAC?
• sometimes only authentication is needed
• sometimes need authentication to persist longer than the encryption (eg.
archival use)
• note that a MAC is not a digital signature

More Related Content

PPTX
Hash Function
PPTX
Information and network security 41 message authentication code
PPT
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
PPT
cryptography and network security by william stallings
PPT
ch11.ppt
PPT
Message authentication and hash function
PPTX
3.1Asymetric_encryption(1).pptx
PDF
Cns
Hash Function
Information and network security 41 message authentication code
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORK
cryptography and network security by william stallings
ch11.ppt
Message authentication and hash function
3.1Asymetric_encryption(1).pptx
Cns

Similar to Hashed message authentication code - Network (20)

PDF
Cs8792 cns - unit iv
PDF
Cs8792 cns - unit iv
PPTX
cryptography security
PPT
ch11.ppt
PPT
Message Authentication Requirement-MAC
PPT
Information and data security cryptography and network security
PDF
CNIT 141: 13. TLS
PDF
1.5 Partition, lower bounds key , secrecy, ciphers.pdf
PPTX
CCNA 200-301 Chapter 28 Securing Wireless Networks.pptx
PDF
BAIT1103 Chapter 2
PPT
Message Authentication
PPT
Message authentication
 
PDF
CNIT 141 13. TLS
PDF
CNIT 129S: Ch 7: Attacking Session Management
PPTX
Cloud-Security-Prevention-Techniques-22042025-111844am (2).pptx
PPTX
Information and network security 42 security of message authentication code
PPS
Message AUthentication Code
PDF
CNIT 141: 13. TLS
PPTX
Ppt cns
PPTX
unit4- predicate logic in artificial intelligence
Cs8792 cns - unit iv
Cs8792 cns - unit iv
cryptography security
ch11.ppt
Message Authentication Requirement-MAC
Information and data security cryptography and network security
CNIT 141: 13. TLS
1.5 Partition, lower bounds key , secrecy, ciphers.pdf
CCNA 200-301 Chapter 28 Securing Wireless Networks.pptx
BAIT1103 Chapter 2
Message Authentication
Message authentication
 
CNIT 141 13. TLS
CNIT 129S: Ch 7: Attacking Session Management
Cloud-Security-Prevention-Techniques-22042025-111844am (2).pptx
Information and network security 42 security of message authentication code
Message AUthentication Code
CNIT 141: 13. TLS
Ppt cns
unit4- predicate logic in artificial intelligence
Ad

More from rajirajesh8 (6)

PPTX
Network security - Introduction to Message authentication
PPTX
Network security- Message authentication
PPTX
Message authentication code - Network Security
PPT
ch14_ Key management in network security
PPT
Operating system virtual memory by silberscatz
PPT
EncryptionTechChap2.ppt
Network security - Introduction to Message authentication
Network security- Message authentication
Message authentication code - Network Security
ch14_ Key management in network security
Operating system virtual memory by silberscatz
EncryptionTechChap2.ppt
Ad

Recently uploaded (20)

PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT
Mechanical Engineering MATERIALS Selection
PDF
Digital Logic Computer Design lecture notes
PDF
PPT on Performance Review to get promotions
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
DOCX
573137875-Attendance-Management-System-original
PPT
introduction to datamining and warehousing
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
Geodesy 1.pptx...............................................
Foundation to blockchain - A guide to Blockchain Tech
bas. eng. economics group 4 presentation 1.pptx
Construction Project Organization Group 2.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mechanical Engineering MATERIALS Selection
Digital Logic Computer Design lecture notes
PPT on Performance Review to get promotions
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Internet of Things (IOT) - A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Embodied AI: Ushering in the Next Era of Intelligent Systems
573137875-Attendance-Management-System-original
introduction to datamining and warehousing
Model Code of Practice - Construction Work - 21102022 .pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Safety Seminar civil to be ensured for safe working.
CH1 Production IntroductoryConcepts.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
Geodesy 1.pptx...............................................

Hashed message authentication code - Network

  • 2. Message Authentication • message authentication is concerned with: • protecting the integrity of a message • validating identity of originator • non-repudiation of origin (dispute resolution) • will consider the security requirements • then three alternative functions used: • hash function (see Ch 11) • message encryption • message authentication code (MAC)
  • 3. Message Authentication Codes • as shown the MAC provides authentication • can also use encryption for secrecy • generally use separate keys for each • can compute MAC either before or after encryption • is generally regarded as better done before • why use a MAC? • sometimes only authentication is needed • sometimes need authentication to persist longer than the encryption (eg. archival use) • note that a MAC is not a digital signature

Editor's Notes

  • #2: One of the most fascinating and complex areas of cryptography is that of message authentication and the related area of digital signatures. We now consider how to protect message integrity (ie protection from modification), as well as confirming the identity of the sender. Generically this is the problem of message authentication, and in eCommerce applications is arguably more important than secrecy. Message Authentication is concerned with: protecting the integrity of a message, validating identity of originator, & non-repudiation of origin (dispute resolution). There are three types of functions that may be used to produce an authenticator: a hash function, message encryption, message authentication code (MAC). Hash functions, and how they may serve for message authentication, are discussed in Chapter 11. The remainder of this section briefly examines the remaining two topics. The remainder of the chapter elaborates on the topic of MACs.
  • #3: The process depicted on the previous slide provides authentication but not confidentiality, because the message as a whole is transmitted in the clear. Confidentiality can be provided by performing message encryption either after (see Stallings Figure 12.4b) or before (see Stallings Figure 12.4c) the MAC algorithm. In both these cases, two separate keys are needed, each of which is shared by the sender and the receiver. Typically, it is preferable to tie the authentication directly to the plaintext, so the method of Figure 12.4b is used. Can use MAC in circumstances where just authentication is needed (or needs to be kept), see text for examples (e.g. such as when the same message is broadcast to a number of destinations; when one side has a heavy load and cannot afford the time to decrypt all incoming messages; or do not need to keep messages secret, but must authenticate messages). Finally, note that the MAC does not provide a digital signature because both sender and receiver share the same key.