Chapter 5ii: Message Authentication Codes Flashcards
1
Q
- (Cryptographic) hashes alone do not protect against intentional tampering!
- MACs include a secret key K in addition to the message m they aim to protect.
- Only the persons with knowledge of K can (re-)compute the MAC. Explain the procedure.
A
2
Q
MACs:
* Do …
* Do …
* Cannot…
* Can be replayed (for same m)
A
prove message integrity
detect tampering
be forged
3
Q
- Do MACs prove authenticity?
A
- It depends on scenario
- If k is shared between Alice and Bob, Alice (Bob) knows that Bob (Alice) must have computed MACK (m); comparable to challenge/response authentication
- If k is a shared group key used by Alice, Bob, Cesar, …, e.g. Alice knows that MACK (m) was computed by a group member, but not by which one
- Also, an external observer cannot validate MACK (m) as k is unknown
4
Q
Explain.
A
- Alice protects/authenticates her message m with a MAC function
- Alice has to send m and the MAC value to Bob.
- Bob can verify the MAC code by using the shared key:
- He reads Alice’s MACK (m)
- He can check if MACK (m) he computed matches the one sent by Alice.
- If there is a match, m was not modified, as only Alice and Bob who K .
- Take home message: for integrity/authenticity checks the receiver needs to know m and a secure modi- fication check value that it can compare.
5
Q
Explain the issue here.
A
6
Q
A
7
Q
Common MAC Functions
Families of MAC constructions// Reasons of MAC constructions
A
8
Q
explain HASHMACS
A
9
Q
A
10
Q
CBC-MAC security
A
11
Q
CBC-MAC performance
A
12
Q
CMACs
A