Chapter 7 - MACs and Signatures Flashcards

1
Q

What is the problem with message Digest & how to provide authentication and integrity with Mac and Signatures?

A
  • Message digests provide (some degree of) integrity
    • Problem: attacker replaces the plaintext and the digest
  • To provide authentication and integrity:
    • MAC: digest + secret key cryptography
    • Signature: digest + public key cryptography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is MAC & Draw a digram to depict it?

A
  • Message Authentication Code (MAC)
  • A MAC is a keyed message digest
    • Takes an arbitrary amount of input data AND a secret key to create a short digest
    • Sender sends both plaintext and MAC. Receiver computes his own MAC to see if they match
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What Do MACs Provide (CIA)?

A
  • Confidentiality: No
    • Plaintext is sent
  • Integrity
    • An attacker without the secret key cannot create a matching digest for the tampered message
  • Authentication
    • Any other person does not have the correct key to create a matching digest
  • Common MAC algorithm: HmacSHA1
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can we provide Authentication & Draw the digram to depict?

A
  • We can reverse the use of keys in public key cryptography to provide authentication!
    • Since the sender’s public key can decrypt correctly, the message must be encrypted using the sender’s private key
    • Since only the sender has her own private key, this authenticates her
    • Have integrity or confidentiality?
    • Disadvantage: long encryption time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Signature & Draw the digram to depict?

A

Signature: a message digest encrypted with the sender’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Do Signatures Provide (CIA)?

A
  • Confidentiality: No
    • Plaintext is sent
  • Integrity
    • Attacker cannot produce matching digest of tampered message without correct encryption key
  • Authentication
    • Any other person does not have the correct key to create a matching digest
  • Common signature algorithm: DSA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Are Two Uses of Public Key Cryptography?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the Attack on Signatures?

A
  • How to “forge” a signature?
    • Different message but same digest?
  • Attack:
    • Alice has a message M with digest D
    • Suppose there is a different message M’ with a digest D’ such that D = D’
    • Alice generates the signature
    • Attacker replaces M with M’, keeps same signature
    • Bob will believe Alice signs M’
  • Level of effort:
    • If the digest has n bits, then on average, it needs ~2n messages to generate such a match
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the Birthday Attack On Signatures?

A
  • Consider the following scenario:
    • Trudy generates 2n/2 variations M1 , M2 , … of a message M, all with essentially the same meaning
    • Trudy generates another 2n/2 variations N1 , N2 , … of a different message N
    • It is likely that D(Mi) = D(Nj) for some i and j (probability > 0.5)
    • Trudy gives Mi to Alice to sign
    • Trudy gives Alice’s signature and Nj to Bob
    • Bob believes Alice signed Nj
  • Level of effort: ~2n/2, much smaller than before
  • (1 second vs. billions of years, for n = 128)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly