Chapter 5ii: Message Authentication Codes Flashcards

1
Q
  • (Cryptographic) hashes alone do not protect against intentional tampering!
  • MACs include a secret key K in addition to the message m they aim to protect.
  • Only the persons with knowledge of K can (re-)compute the MAC. Explain the procedure.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

MACs:
* Do …
* Do …
* Cannot…
* Can be replayed (for same m)

A

prove message integrity

detect tampering

be forged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Do MACs prove authenticity?
A
  • It depends on scenario
  • If k is shared between Alice and Bob, Alice (Bob) knows that Bob (Alice) must have computed MACK (m); comparable to challenge/response authentication
  • If k is a shared group key used by Alice, Bob, Cesar, …, e.g. Alice knows that MACK (m) was computed by a group member, but not by which one
  • Also, an external observer cannot validate MACK (m) as k is unknown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain.

A
  • Alice protects/authenticates her message m with a MAC function
  • Alice has to send m and the MAC value to Bob.
  • Bob can verify the MAC code by using the shared key:
  • He reads Alice’s MACK (m)
  • He can check if MACK (m) he computed matches the one sent by Alice.
  • If there is a match, m was not modified, as only Alice and Bob who K .
  • Take home message: for integrity/authenticity checks the receiver needs to know m and a secure modi- fication check value that it can compare.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain the issue here.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Common MAC Functions

Families of MAC constructions// Reasons of MAC constructions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

explain HASHMACS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CBC-MAC security

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CBC-MAC performance

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CMACs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly