Message Authentication Flashcards
Why might we want to authenticate, but not encrypt?
When we are broadcasting a message to multiple destinations, when one side of the information transfer has a heavy load and cannot decrypt all incoming messages, when you are only interested in whether the information is genuine.
What is a MAC?
Message Authentication Code. A secret key is used to generate a small block of data, which is appended to the message.
Who knows the secret key used to generate the MAC?
Both sender and receiver.
How do MACs work?
Sender calculates the MAC as a function of the secret key and message. They append this to the message and send it. The receiver takes the whole message, removes the MAC, and then computes their own MAC. If the two MACs are the same, then the message has not been modified.
True or false, DES can be used to generate a MAC?
True
True or false, Hash functions require a secret key?
False
Describe how one way hash functions work.
Hash a given message, and encrypt the hash. Append this encrypted hash to the message. The receiver will then decrypt the hash, and compare it to when they hash the received message.
Can we do hashing without encryption?
Yes. We can use a secret value, S, and hash this together with the message, and then append this to the message. The receiver will then take a hash of the message and their own secret value S, and compare it to the appended hash.
Name the 5 requirements of a secure hash function.
1) Can be used on a block of data of any size. 2) Produce a fixed length output. 3) You cannot work out the input, given you know the output (preimage resistant). 4) For any block x, you cannot easily find the block y!=x if H(x) = H(y) (second preimage resistant). 5) For any block x, you cannot easily find a block y such that H(x) = H(y) (collision resistant).
What makes a hash function strong?
If it is collision resistant.
What is SHA?
Secure Hash Algorithm. Every bit of the generated hash is a function of every bit of the input.
True or false, hashing is slower than encrypting?
False
True or false, MAC can help you determine if your secret key has been broken?
False
True or false, MAC is also used for preventing eavesdropping?
False
True or false, MAC can be used to check the integrity of the message sent?
True