20CS17 – INFORMATION SECURITY
LAKIREDDY BALI REDDY COLLEGE OF ENGINEERING (AUTONOMOUS) Accredited by NAAC & NBA (Under Tier - I) ISO 9001:2015 Certified Institution Approved by AICTE, New Delhi. and Affiliated to JNTUK, Kakinada L.B. REDDY NAGAR, MYLAVARAM, KRISHNA DIST., A.P.-521 230. DEPARTMENT OF Information Technology |
UNIT-2
Program & Semester: B.Tech & VI SEM
Section: CSE-C
Academic Year: 2023 - 24
Mr . M. Vijay Kumar
Sr Assistant Professor
Dept.of IT, LBRCE
Message Authentication
Message Authentication
Security Requirements
Message Encryption
Message Encryption
Message Authentication Code (MAC)
MAC
MAC codes
MAC Properties
MAC = CK(M)
Requirements for MACs
Using Symmetric Ciphers for MACs
Data Authentication Algorithm
HMAC
HMACK = Hash[(K+ XOR o pad) ||
Hash[(K+ XOR I pad)||M)]]
HMAC Overview
HMAC Security
Keyed Hash Functions as MACs
KeyedHash = Hash(Key|Message)
Hash Functions
h = H(M)
Hash Functions & Digital Signatures
Requirements for Hash Functions
Simple Hash Functions
Birthday Attacks
Block Ciphers as Hash Functions
Hash Functions & MAC Security
Hash Functions & MAC Security
Hash and MAC Algorithms
Hash Algorithm Structure
Secure Hash Algorithm
How SHA Works?
SHA 1
SHA Overview
(A=01 23 45 67,
B=89 AB CD EF,
C=FE DC BA 98,
D=76 54 32 10,
E=C3 D2 E1 F0)
Continue…
6. output hash value is the final buffer value
SHA-1 Compression Function
ABCDE=(F[t]+E+S5(A)+W[t]+K[t]),>>>Shift right by 1 bit for next iteration
SHA-1 Compression Function terms
(A,B,C,D,E) <-(E+f(t,B,C,D)+(A<<5)+Wt+Kt),A,(B<<30),C,D)
Process F(t) in each SHA-1 round
�ROUND 2: b XOR c XOR d
�ROUND 3: (b AND c) OR (b AND d) OR (c AND d)
�ROUND 4: b XOR c XOR d
Creation of 80-word input Wt
Adds redundancy and interdependence among message blocks
Cryptanalysis and Limitation
1. Impossible to re-create a message given a fingerprint
2. Collision Free
Revised Secure Hash Standard
SHA-512
SHA-512
SHA-512 Overview
1. Padding,2.Append Length,3.Divide the input into 1024- bit blocks
4.Initialization Of Chaining Variable
5.Process Blocks�
Initialize the buffers
SHA-512 Round Function
SHA-512 Round Function
SHA-512 Round Function
Let us look in more detail at the logic in each of the 80 steps of the processing of one 512-bit block (Figure). Each round is defined by the following set of equations:
SHA-512 Round Function
the conditional function: If e then f else g
the function is true only of the majority (two or three) of the arguments are true.
RORT (ai By 39 Bit)
RORT (ei By 41 Bit)
Why Public-Key Cryptography
Principles of Public-Key Cryptography
Principles Public-Key Cryptography�
Public-Key Characteristics
Public-Key Cryptosystems: Secrecy�
Public-Key Cryptosystems: Authentication�
Public-Key Applications
Security of Public Key Schemes
Difference between symmetric and asymmetric cryptography�
.
RSA
RSA Key Setup
RSA Use
RSA Example - Key Setup
Diffie-Hellman Key Exchange
Diffie-Hellman Setup
chooses a secrete/private key: xB < q
Compute public key: yB = α XB mod q
Key Exchange Protocols�
Diffie-Hellman Key Exchange
KAB = α xA.xB mod q
K= yAXB mod q (which B can compute/receiver)
K= yBxA mod q (which A can compute/sender)
Assume xA=97 & xB =233
yA = α XA mod q
yB = α XB mod q
Digital Signatures
Digital Signature Properties
.
Direct Digital Signatures
Arbitrated Digital Signatures
Digital Signature Standard (DSS)
Digital Signature Algorithm (DSA)
Digital Signature
DSA Key Generation
DSA Signature Creation
r = (gk(mod p))(mod q)
s = (k-1.H(M)+ x.r)(mod q)(S = 105 mod 19 = 3)
The signature is (r,s)
DSA Signature Verification
u1= (H(M).w)(mod q) =>11(14-16.3) mod 18 = 4
u2= (r.w)(mod q)
v = (gu1.yu2(mod p)) (mod q)
Electronic signature is an electronic symbol attached to a contract or other record, used by a person with an intent to sign.
Digital signatures guarantee that an electronic document is authentic.
Digital Certificates
They provide a foundation for
Sample View of a Certificate
Certificate Types :
1.Private/Personal 2.Server 3.Developer
.
How Digital Certificates work?
Certificate authorities
Certificate Authority Contd….
Signer
PUBLIC KEY
PRIVATE KEY
Certificate Authority
PUBLIC KEY
CA Certificate
Request
Certificate
Issue
Plaintext
Plaintext
Sign
(Private Key)
Signature
+
Signature
+
Verify?
Step 1
Step 2
Step 3
Step 5
Step 6
Step 4
This is signer’s
public key
Isl Certificate Authority
Certificate Authority Contd…�
Key Management
Distribution of Public Keys
Public Announcement
Public Announcement
Publicly Available Directory
Publicly Available Directory
Public-Key Authority
Public-Key Authority
Public-Key Certificates
Public-Key Certificates
Kerberos
Kerberos Requirements
Kerberos terminology
A simple Authentication Dialogue
Ticket = EKv[IDc || Pc || IDv]
Problems with the simple dialogue
A better Authentication Dialogue
Once per user logon session:
(1) C 🡲 AS: IDc || IDtgs
(2) AS 🡲 C: E [Kc , Tickettgs]
Tickettgs =E(Ktgs, [IDc || ADc || IDtgs || TS1 || Lifetime1])
Once per type of service:
(3) C 🡲 TGS: IDc || IDv ||Tickettgs
Ticketv =E(Kv, [IDc || ADc || IDv || TS2 || Lifetime2])
Once per server session:
(5) C 🡲 V: IDc || Ticketv
Problems with the better dialogue
The threat is that an opponent will steal the ticket and use it before it expires.
Version 4 Authentication Dialogue
Authentication Service Exchange: To obtain Ticket-Granting Ticket
(1) C 🡲 AS: IDc || IDtgs ||TS1
(2) AS 🡲 C: EKc [Kc,tgs|| IDtgs || TS2 || Lifetime2 || Tickettgs]
Tickettgs =E(Ktgs, [Kc,tgs || IDc || ADc || IDtgs || TS2 || Lifetime2])
Ticket-Granting Service Echange: To obtain Service-Granting Ticket
(3) C 🡲 TGS: IDv ||Tickettgs ||Authenticatorc
Tickettgs =E(Ktgs, [Kc,tgs || IDc || ADc || IDtgs || TS2 || Lifetime2])
Ticketv =E(Kv, [Kc,v || IDc || ADc || IDv || TS4 || Lifetime4])
Authenticatorc =E(Kc,tgs , [IDc || ADc || TS3])
Version 4 Authentication Dialogue
Kerberos v4 Overview
Kerberos v4 Overview
Kerberos Realms
Kerberos Realms
Kerberos Version 5
.
Difference Between Version 4 and 5
X.509 Authentication Service
X.509 Certificates
X.509 Certificates Contd...
X.509 Certificates
Obtaining a Certificate
CA Hierarchy Use
CA Hierarchy
Certificate Revocation
X.509 Version 3
Certificate Extensions