SlideShare a Scribd company logo
1 of 23
Download to read offline
PRINCE DUAH MENSAH-MPHIL. I. T 1
AKENTEN APPIAH- MENKA UNIVERISTY OF SKILL TRAINING
AND ENTREPRENEURIAL DEVELOPMENT
HASH- BASED MESSAGE AUTHENTICATION CODE AND
SECURE HASH FUNCTION 256
(A PROPOSED NOVEL AUTHENTICATION CODE)
BY
PRINCE DUAH MENSAH
(8221520010)
MIT 821 INFORMATION SECURITY
PRINCE DUAH MENSAH-MPHIL. I. T 2
TABLE OF CONTENTS
Abstract 3
1 Introduction 4
1.2 Purpose of the article 5
2 Literature Survey 6
2.1 Wide Area Networks 6
2.2 Message Authentication 6
2.3 Message Authentication Code 6
2.4 HMAC SHA 256 Algorithm 7
3 Methodology 8
3.1 Sources of Data Collection 8
3.2 HMAC SHA 256 Design Architecture 9
3.4 Research Instruments 10
4 Results and Discussion 12
4.1 Application of HMAC SHA 256 12
4.2 Collision Resistance of HMAC SHA 256 14
4.3 Time Complexity of HMAC SHA 256 16
5 Summary, Conclusion and Recommendation 20
5.1 Summary of Major Findings 20
5.2 Recommendation 21
5.3 Conclusion 21
6 Reference 22
PRINCE DUAH MENSAH-MPHIL. I. T 3
ABSTRACT
Conventional authentication methods, like simple text- based passwords, have shown
vulnerabilities to different types of security attacks. Most of all the breaches involve
credentials, whether stolen via social engineering or hacked using brute force. Therefore,
a robust user authentication mechanism is crucial to have secure systems. Combining the
use of a hash function, SHA 256 and a secret key. HMAC approach can be effective
strategy for data origin authentication and integrity verification mechanisms. This article
proposes a Hash- based Message Authentication Code and Secure Hash Algorithm 256,
with the acronym HMAC SHA 256 to solve the deficiencies in Message Digest Method 5
including the traditional username- password authentication. HMAC SHA 256 can be
applied to verification of email, authenticate data form, Internet of Things (IoT) and reset
password. The novelty of the proposed mechanism lies in a Trust Based System which
identifies the malicious nodes in the network and differentiates them from trusted nodes.
The trust value of the participating nodes is increased only for every successful
transmission and decreased for those nodes that do not send the data towards the desired
destination. Using Java programming language, HTML, CSS and Python, the proposed
authentication protocol was analysed to determine its efficiency and effectiveness. The
study found that HMAC SHA 256 is ideal for higher performance systems and provides
higher security as compared to MD 5. The study also revealed that HMAC SHA 265 has a
strong collision resistance to attacks and its therefore recommended for encryption and
solving the deficiencies in MD 5.
PRINCE DUAH MENSAH-MPHIL. I. T 4
CHAPTER ONE
INTRODUCTION
Today, information is fundamental for basic operations in every home, institution,
organization and the society at large. Information involves computers, networks and
communication media which are used to transmit the data from one point to another. The
power of attacks to guess or harvest passwords to gain illicit access to a system or data are
becoming greater as the sophistication of password cracking techniques increases and high-
power computing becomes more affordable. Routing in a distributed network has become
a big challenge to network security and there has been various studies and many researches
in this field attempting to propose more secure approach to it. Hence, there is an important
need to have more robust and secure access mechanisms to protect data and systems.
The most popular, yet the most basic, mechanism for user authentication is the use of
Message Digest Method 5, mainly because the concept of using passwords is an efficient
and cost effective solution for traditional user authentication. Nevertheless, this is the
weakest level of authentication and it has been realized that Message Digest Method 5 is
not reliable to provide adequate protection, due to several security threats. Verifying the
integrity and authenticity of information is a prime necessity in computer networks as
sensitive information are resident on computers and their networks.
Hash- based Message Authentication Code and Secure Hash Algorithm 256 (HMAC SHA
256) was proposed to provide higher levels of safety and to add strong protection against
account theft by greatly increasing the difficulty for attackers to gain access to information
systems and data. MFA mechanisms are mostly based on a hash function, SHA 256 and a
secret key HMAC. This article therefore proposes HMAC SHA 256 with a designed Trust Based
System to make authentication mechanism more robust and secure and resolve the deficiencies in
MD 5.
PRINCE DUAH MENSAH-MPHIL. I. T 5
1.2 Purpose of the Article
The main purpose of this article is to propose HMAC SHA 256 to make authentication
mechanism more robust and secure and resolve the deficiencies in MD 5. The article
specifically looks at:
i. Application of the HMAC SHA 256
ii. Attack or collision resistance of HMAC SHA 256 compared with MD 5
iii. The performance and time complexity of the HMAC SHA 256
PRINCE DUAH MENSAH-MPHIL. I. T 6
CHAPTER TWO
LITERATURE SURVEY
The literature survey entails the systematic identification and analysis of documents
containing information related to the article. The literature survey section encompasses
wide area networks, message authentication, message authentication code and HMAC
SHA 256 Algorithm and its advantages and disadvantages.
2.1 Wide Area Networks
A WAN is a data communications network that operates beyond the geographic scope of
a Local Area Network. Wide Area Network use facilities provided by a service provider or
carrier such as a telephone or cable company, to connect the locations of an organization
to each other including to external services and remote users. Generally, Wide Area
Networks carry a variety of traffic types such as voice, data and video.
2.2 Message Authentication
Message Authentication is data authentication that shows that a message has not been
modified while in transit and that the receiving party can verify the source of the message.
Message authentication does not necessarily include the property of non- repudiation. It is
typically achieved by using message authentication codes (MACs), authenticated
encryption or digital signatures.
2.3 Message Authentication Code
Message Authentication Code (MAC) is a string of code or a symmetric key cryptographic
technique used to authenticate the origin and nature of a message. MACs use authentication
cryptography to verify the legitimacy of data sent through a network or transferred from
one person to another. Some of the Message Authentication Codes includes one- time
message authentication code, carter- wegman message authentication code and hash- based
authentication code.
PRINCE DUAH MENSAH-MPHIL. I. T 7
2.4 HMAC SHA 256 ALGORITHM
As encryption ensures only the confidentiality of the data being sent, a digital signature
which is another security technique ensures other security goals like data authentication,
non-repudiation and data integrity (Dilli & Chandra, 2014). HMACSHA256 is a type of
keyed hash algorithm that is constructed from the SHA-256 hash function and used as a
Hash-based Message Authentication Code (HMAC)
Hashing can be used in place of the digital process in long data or messages. In this, the
data or message is passed through an algorithm called cryptographic hash function or one
way-hash function (SHA256) before signing. Hashing creates a compressed image of the
data in the form of a hash value or message digest which is usually unique and much
smaller than the message. Any change made to the message produces a different hash result
even if the same hash function is used.
Definition of HMAC-SHA256
HMAC-SHA256 defined as:
𝐻𝑀𝐴𝐶 (𝐾,𝑚) =𝐻((𝐾 ⊕ 𝑜𝑝𝑎𝑑) ║ 𝐻((𝐾 ⊕ 𝑖𝑝𝑎𝑑) ║ 𝑚))
which uses the following parameters:
H = cryptographic hash function = SHA256
K = secret key
m = message
║ = concatenation
⊕ = exclusive OR
opad = outer padding
ipad = inner padding
PRINCE DUAH MENSAH-MPHIL. I. T 8
2.4.1 Advantages of HMAC SHA 256 Algorithm
i. HMAC SHA 256 provides a high level of security due to its strength
ii. It is practically impossible to reverse- engineer the original message from its hash
value
iii. It is resistant to various cryptographic attacks including collision and pre- image
attacks.
2.4.2 Disadvantages of HMAC SHA 256 Algorithm
i. HMACs uses shared key which may lead to non-repudiation. If either sender or
receiver’s key is compromised then it will be easy for attackers to create
unauthorized messages.
PRINCE DUAH MENSAH-MPHIL. I. T 9
CHAPTER THREE
METHODOLOGY
This section of the article discusses the various methods that makes the Hash Message
Authentication Code and Secure Hash Algorithm 256 an efficient choice over the other
algorithms, including the sources of data collection, HMAC SHA 256 Design Architecture
and research instruments.
3.1 Sources of Data Collection
Information for this report was sourced from various secondary sources, all listed in the
reference list. Data from publications by the 2013 International Conference on Electronic
Engineering and Computer Science also proved valuable. This report is not a
comprehensive analysis of the available literature but provides a broad overview of the
algorithm.
3.2 HMAC SHA 256 Design Architecture
HMAC utilizes two hash functions and its output is the same as that of the underlying hash
function, (i.e. 256 bits concerning SHA-256). The HMAC architecture once powers up has
to be initialized through activation of the input signal init. The initialization procedure
corresponds to computing the hash values of two certain 512-bit blocks, which are the
corresponding keys, and it is performed independently in the two SHA-256 cores at the
same time. The 512-bit Xorskey component contains simple XOR gates to compute the
values “k0 xor ipad” and “k0 xor ipad”, which are needed in HMAC’s initialization. This
initialization process is completed after 33 clock cycles.
When the above initialization finishes, the hash values from the outputs of the two SHA-
256 cores are stored and then are used as the new initial values (H1 – H1) by the two SHA-
256 cores. Since these two values and the corresponding keys must be protected and treated
as secret, they are stored in registers. This is the first time that a 512-bit message block may
PRINCE DUAH MENSAH-MPHIL. I. T 10
be supplied for process to the HMAC core and the sendmes handshake signal is activated
indicating that the system can accept a new message so as to compute its HMAC value.
Figure 3.1: HMAC-SHA-256 Architecture
3.3 Research Instruments
Research instruments are tools used for data collection and analysis of the study. The
following tools were used in analyzing HMAC-SHA-256 Algorithm: Java and Python
Programming Languages, OpenSSL version 1.1.1 and Trust Based System.
3.3.1 Trusted Based System
The Trust Based System identifies malicious nodes in the network and differentiates them
from the trusted nodes by providing a trust value to the participating nodes. For every
successful data transmission, the trust value increases but decreases for nodes that do not
send data to their destination or whose data has been altered or tampered with. This system
in addition to the HMAC-SHA256 algorithm provides additional security to transmitted
data. The trust based system gives a trust value of every node on the network. The trust
PRINCE DUAH MENSAH-MPHIL. I. T 11
value of a node or nodes increase if there is no attack on the sent data, this means the nodes
are not malicious but decreases if malicious nodes exist.
3.3.2 Python
Python is the most efficient cross- platform tool, specifically programming language used
for artificial intelligence and machine learning solutions.
3.3.3 OpenSSL
OpenSSL is an all-around cryptography library tool that offers an open-source application
of the TLS protocol. It allows users to perform various SSL-related tasks, including CSR
(Certificate Signing Request) and private keys generation, and SSL certificate installation.
3.3.4 Java
Java is a multi-platform, object-oriented, and network-centric language that can be used as
a platform in itself. It is a fast, secure, reliable programming language for coding everything
from mobile apps and enterprise software to big data applications and server-side
technologies.
PRINCE DUAH MENSAH-MPHIL. I. T 12
CHAPTER FOUR
EXPERIMENTAL RESULTS AND DISCUSSION
This section of the article presents the findings of the study whose main purpose is to
propose a novel authentication protocol to resolve the deficiencies in the Message Digest
Method 5 Algorithm. The presentation of findings aligns with the objectives of the article
of the proposed novel HMAC SHA 256 Algorithm.
Analyzing Algorithm means to study the specification of the Algorithm and come to a
conclusion about how the implementation of that algorithm will perform in general. Here,
the amount of resources necessary to execute the algorithm is determined and its equivalent
running time (time complexity) or efficiency of the algorithm.
4.1 Application of the HMAC SHA 256
Figure 4.1 HMAC SHA 256 Computation Flow
The above figure 4.1 indicates the HMAC SHA 256 Computation Flow. In Chapter 3, the
figure 3.1 indicates the architecture of the proposed novel HMAC SHA 256 Algorithm,
and this subsection is to analyse how it works. From figure 4.1 Once a message is sent to
the HMAC architecture, the handshake signals new_mes is activated (for one clock cycle)
indicating the arrival of a new input message with input rate of 64 (or more) bits per clock
PRINCE DUAH MENSAH-MPHIL. I. T 13
cycle depending on the employed bus width. At the same time sendmes signal is
deactivated (and stays deactivated) and the system starts formulating the 512-bit input
message block which is over after 8 (or less) clock cycles (depending on the selected bus
width). During these cycles, (and while another message may be in process on any stage
of the two SHA-256 hashing cores) the first 128 bits of the 512-bit input message block
are used to perform the necessary initializations in the Initialization Unit of the first SHA-
256 hashing core. This initialization ends in one clock cycle.
After these 8 clock cycles have pass the processing on the first transformation round of the
first SHA-256 hash core begins and the sendmes signal is activated again indicating that a
new input message can be supplied to the HMAC design. The message that entered in the
first SHA-256 core is processed, and finally after 32 clock cycles its 256-bit hash value
exits the first SHA-256 core. It is then stored in the intermediate register REG_b, along
with padding bits and length information about the input message block in the second SHA-
256 hashing core (message length is always the 256 bits that are produced from the first
SHA-256 hashing core). The 256-bit hash value beyond the register REG_b, also feeds
the initialization unit of the second SHA-256 core. So in the clock cycle that is needed for
formulating the 512-bit input message for the second SHA-256 core (from the 256-bit
output hash value from the first SHA-256 core), also the initialization for processing this
message at the second SHA-256 core has been performed (at corresponding unit of the
second SHA-256). Moreover, in the same clock cycle the necessary signals are generated
so as to enable process at the second SHA-256 hashing core at the very next clock cycle.
Then the rest process for the HMAC value computation begins in the second SHA256
hashing core which is also finalized after 32 clock cycles. Finally, after 65 clock cycles in
total (32 for each one of the two SHA-256 cores and one clock cycle for the intermediate
REG_b padding-register), the final HMAC value is computed. One clock earlier the
handshake signal Hmac_ready is activated so as to notify the host system that at the next
clock cycle the HMAC value can be retrieved.
PRINCE DUAH MENSAH-MPHIL. I. T 14
4.2 Collision Resistance of HMAC SHA 256
The study was conducted using Trust Based System with one hundred nodes and the results
are shown below:
19,10,32,33,40,41,43,45,47,49,82,83,84,85,94,95,97,98,86,87,88,89,90,91,92,93,96,99
and 100 act maliciously while nodes: 17, 18, 5, 11, 4, 12, 3, 20, 2, 9, 15, 1, 8, 16, 7, 13, 6,
14, 30, 31, 34, 35, 36, 37, 38, 39, 42, 44, 46, 48, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61,
62, 63, 64, 65, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79 and 80 transferred data
successfully and securely. Two nodes- node 19 and node 10, are considered malicious
while others are trusted nodes. The study of the second set of 10 nodes gives: Keyed-Hash
Message Authentication Code with Secure Hash Algorithm 256, HMAC-SHA256, was
successfully implemented in a distributed network with the Trust Based System
differentiating the malicious and non-malicious nodes in the network by reducing the trust
value of any tampered node on the network. With this, more secure data can be transmitted
in the network thereby accomplishing the aim of data authentication and data integrity
Figure 4.2. The second set of 10 nodes studied
PRINCE DUAH MENSAH-MPHIL. I. T 15
As shown in Figure 4.2, Start Dispatch button, Stop Dispatcher button, Reset Dispatcher
button, Add node button and Make Malicious button are used to give room for interactivity.
Start Dispatch button is used to initiate sending of data packets from one node to the other.
Reset Dispatcher button on the other hand terminates sending of the data packets in client’s
nodes. Reset Dispatcher button refreshes both the client and the server nodes while Add
node button allows addition of desired number of nodes for the setup. Finally, Make
Malicious button is used to make a node or more nodes to be malicious.
Figure 4.5 Graphical representation of nodes ranging from 81 to 100
Figure 4.3: Graphical representation of users
ranging from 51 to 60
Figure 4.4: Graphical representation of
nodes ranging from 61 to 81
PRINCE DUAH MENSAH-MPHIL. I. T 16
From the above study, specifically looking at the various figures, it can revealed that nodes
19, 10, 32, 33, 40, 41, 43, 45, 47, 49, 82, 83, 84, 85, 94, 95, 97, 98, 86, 87, 88, 89, 90, 91,
92, 93, 96, 99 and 100 acts maliciously based on various characteristics exhibited at the
implementation stage while nodes 17, 18, 5, 11, 4, 12, 3, 20, 2, 9, 15, 1, 8, 16, 7, 13 ,6, 14,
30, 31, 34, 35, 36, 37, 38, 39, 42, 44, 46, 48, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62,
63, 64, 65, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79 and 80 are the trusted nodes.
This implies that the proposed novel HMAC-SHA256 Algorithm with Trust Based System
has a strong collision resistance or attack by detecting the untrusted nodes and separating
them completely from the trusted ones. Additionally, HMAC-SHA256 is resistant to
various cryptographic attacks, including collision and pre-image attacks. HMAC-SHA256
has the longest generated hash of 32 bytes and that makes it stronger to attacks or collision
resistance than MD 5.
4.3 Performance and Time Complexity HMAC SHA 256
In this subsection, we are going to determine the performance or speed or time complexity
of the algorithm, HMAC SHA 256 using Java. In order to test the speed sample code is
used:
import java.util.UUID;
import org.apache.commons.codec.digest.DigestUtils;
import org.apache.commons.lang.time.StopWatch;
public class Test {
private static final int TIMES = 1_000_000;
private static final String UUID_STRING =
UUID.randomUUID().toString();
public static void main(String[] args) {
System.out.println(generateStringToHash());
System.out.println("MD5: " + md5());
PRINCE DUAH MENSAH-MPHIL. I. T 17
System.out.println("SHA-1: " + sha1());
System.out.println("SHA-256: " + sha256());
System.out.println("SHA-512: " + sha512());
}
public static long md5() {
StopWatch watch = new StopWatch();
watch.start();
for (int i = 0; i < TIMES; i++) {
DigestUtils.md5Hex(generateStringToHash());
}
watch.stop();
System.out.println(DigestUtils.md5Hex(generateStringToHash()));
return watch.getTime();
}
public static long sha1() {
...
System.out.println(DigestUtils.sha1Hex(generateStringToHash()));
return watch.getTime();
}
public static long sha256() {
...
System.out.println(DigestUtils.sha256Hex(generateStringToHash()));
return watch.getTime();
}
public static long sha512() {
...
System.out.println(DigestUtils.sha512Hex(generateStringToHash()));
return watch.getTime();
}
public static String generateStringToHash() {
return UUID.randomUUID().toString() +
System.currentTimeMillis();
}
}
PRINCE DUAH MENSAH-MPHIL. I. T 18
Aggregate Results
Results from all iterations are aggregated and compared in the table below. There are 6
main cases. They are listed below and referenced in the table:
 Case 1 – 36 characters length string, UUID is cached
 Case 2 – 49 characters length string, UUID is cached and system time stamp is
calculated each iteration
 Case 3 – 49 characters length string, new UUID is generated on each iteration and
system time stamp is calculated each iteration
 Case 4 – 72 characters length string, UUID is cached
 Case 5 – 85 characters length string, UUID is cached and system time stamp is
calculated each iteration
 Case 6 – 85 characters length string, new UUID is generated on each iteration and
system time stamp is calculated each iteration
All times below are per 1 000 000 calculations:
Figure 4.7: Average Results
PRINCE DUAH MENSAH-MPHIL. I. T 19
From the figure 4.7, HMAC SHA-256 is faster with 31% than SHA-512 only when hashing
small strings. When the string is longer SHA-512 is faster with 2.9%. Time to get system
time stamp is ~121.6 ms per 1M iterations. Time to generate UUID is ~670.4 ms per 1M
iterations. It also competes favourably with MD 5.
PRINCE DUAH MENSAH-MPHIL. I. T 20
CHAPTER FIVE
SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATIONS
The purpose of this article was to propose a novel authentication protocol to resolve the
deficiencies in the Message Digest Method 5 Algorithm. This section presents the summary
of the major findings from the analyses of data, and then, make recommendations and
conclusion.
5.1 Summary of Major Findings
In the first place, it was revealed HMAC SHA 256 computational flow that the HMAC
process mixes a secret key with the message data, hashes the result with the hash function,
mixes that hash value with the secret key again, and then applies the hash function a second
time. The output hash is 256 bits in length.
Secondly, the study shown that the proposed novel HMAC-SHA256 Algorithm with Trust
Based System has a strong collision resistance or attack by detecting the untrusted nodes
and separating them completely from the trusted ones. The HMAC-SHA256 algorithm
is resistant to various cryptographic attacks, including collision and pre-image attacks.
HMAC-SHA256 has the longest generated hash of 32 bytes and that makes it stronger to
attacks or collision resistance than MD 5.
Furthermore, the study revealed that the HMAC SHA-256 is faster with 31% than SHA-
512 only when hashing small strings. When the string is longer SHA-512 is faster with
2.9%. Time to get system time stamp is ~121.6 ms per 1M iterations. Time to generate
UUID is ~670.4 ms per 1M iterations and this makes it competes favourably with MD 5.
PRINCE DUAH MENSAH-MPHIL. I. T 21
5.2 Recommendation
Based on the various findings, I will recommend the proposed novel HMAC SHA 256
Algorithm as an authentication encryption for web- based or online business rather than
single- block hash function.
5.3 Conclusion
The International Journal of Engineering Research and Technology (IJERT) on March
2014 in a paper titled, “Design of an HMAC CO- Processor Unit Based on SHA- 2 Family
of Hash Functions” volume 3, issue3, conclude that “SHA- 2 with HMAC is completely
feasible to efficiently replace MD 5 with SHA- 2 in hardware implementations of HMAC”.
In conclusion, this article seeks to confirm the submission from IJERT that the proposed
novel HMAC SHA 256 is the ideal authentication algorithm to solve the deficiencies in
MD 5 as it a has higher performance and a higher security or stronger collision resistance
to attacks and its therefore recommended for encryption.
PRINCE DUAH MENSAH-MPHIL. I. T 22
REFERENCE
Bonneau, J.; Herley, C.; Van Oorschot, P.C.; Stajano, F (2015). Passwords and
the evolution of imperfect authentication. Commun., 58, 78–87.
Furnell, S & Warren, M. (1999), ‘Computer Hacking and Cyber Terrorism:
The Real Threats in the New Millennium?’ Computers and Security, vol. 18, no. 12, pp.
28-34.
Frank, H & Katz, (2010), ‘WPA vs. WPA2: Is WPA2 Really an Improvement
on WPA?’, 4th Annual Computer Security Conference, Coastal Carolina University,
Myrtle Beach, SC. vol. 4, no. 5, pp 9-15
Joan, D & Vincent, R (2002), ‘The Design of Rijndael: AES -The Advanced
Encryption Standard (Information Security and Cryptography)’, 2nd edn, Springer, USA,
pp 76-38.
Joon, S. P & Derrick, D (2003), ‘WLAN Security: Current and Future’, IEEE
Computer Society, Syracuse University, NY, USA. Pp 12-14. Labib, K 2004, ‘Computer
Security and Intrusion Detection’, Crossroads, vol. 11, no. 1 pp. 2-4.
Mohammed, F & Shawkat, A (2015), ‘Recurrent security gaps in 802.11ac
routers’, International journal of scientific & technology research vol. 4, no. 9, pp 12-14.
Newman, R (2006), ‘Cybercrime, Identity Theft and Fraud: Practicing Safe
Internet – Network Security Threats and Vulnerabilities’, Proceedings of the 3rd Annual
Conference on Information Security Curriculum Development. New York, USA, vol. 6,
no. 3, pp. 68-78.
Park, JS. & Dicoi, D. (2003), ‘WLAN security: current and future’, IEEE
Internet Computing, vol. 7, no. 5, pp. 60–65.
PRINCE DUAH MENSAH-MPHIL. I. T 23

More Related Content

What's hot (20)

Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Homomorphic Encryption
Homomorphic EncryptionHomomorphic Encryption
Homomorphic Encryption
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Aes
AesAes
Aes
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Overview of cryptography
Overview of cryptographyOverview of cryptography
Overview of cryptography
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Cryptography
CryptographyCryptography
Cryptography
 
Feistel cipher
Feistel cipherFeistel cipher
Feistel cipher
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Hash function
Hash functionHash function
Hash function
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 

Similar to HMAC SHA 256- PROPOSED AUTHENTICATION ALGORITHM-PRINCE DUAH MENSAH-MPhil IT (2).pdf

A new algorithm for implementing message authentication and integrity in soft...
A new algorithm for implementing message authentication and integrity in soft...A new algorithm for implementing message authentication and integrity in soft...
A new algorithm for implementing message authentication and integrity in soft...TELKOMNIKA JOURNAL
 
Information and data security cryptography and network security
Information and data security cryptography and network securityInformation and data security cryptography and network security
Information and data security cryptography and network securityMazin Alwaaly
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingswathi78
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd Iaetsd
 
An Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive ComputingAn Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive Computinginventionjournals
 
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...SIR SUCCESS PRINCE DUAH DUAH
 
Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2editor1knowledgecuddle
 
1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-mainkalachandru
 
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computingchennaijp
 
Implementation of message authentication code using DNA-LCG key and a novel h...
Implementation of message authentication code using DNA-LCG key and a novel h...Implementation of message authentication code using DNA-LCG key and a novel h...
Implementation of message authentication code using DNA-LCG key and a novel h...IJECEIAES
 
Distributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebDistributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebEditor IJCATR
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsKamal Spring
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudIJTET Journal
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXIJNSA Journal
 
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...IJMTST Journal
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmIRJET Journal
 
6222019 Originality Reporthttpsblackboard.nec.eduweb.docx
6222019 Originality Reporthttpsblackboard.nec.eduweb.docx6222019 Originality Reporthttpsblackboard.nec.eduweb.docx
6222019 Originality Reporthttpsblackboard.nec.eduweb.docxtroutmanboris
 

Similar to HMAC SHA 256- PROPOSED AUTHENTICATION ALGORITHM-PRINCE DUAH MENSAH-MPhil IT (2).pdf (20)

A new algorithm for implementing message authentication and integrity in soft...
A new algorithm for implementing message authentication and integrity in soft...A new algorithm for implementing message authentication and integrity in soft...
A new algorithm for implementing message authentication and integrity in soft...
 
Information and data security cryptography and network security
Information and data security cryptography and network securityInformation and data security cryptography and network security
Information and data security cryptography and network security
 
Unit 6
Unit 6Unit 6
Unit 6
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
Iaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processingIaetsd enhancement of performance and security in bigdata processing
Iaetsd enhancement of performance and security in bigdata processing
 
An Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive ComputingAn Efficient privacy preserving for Mobile and Pervasive Computing
An Efficient privacy preserving for Mobile and Pervasive Computing
 
Mj2521372142
Mj2521372142Mj2521372142
Mj2521372142
 
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
A REPORT ON THE ANALYSIS ON WEB AUTHENTICATION BASED ON SINGLE BLOCK HASH FUN...
 
Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2
 
1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main
 
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive ComputingJPJ1449 Efficient Authentication for Mobile and Pervasive Computing
JPJ1449 Efficient Authentication for Mobile and Pervasive Computing
 
Implementation of message authentication code using DNA-LCG key and a novel h...
Implementation of message authentication code using DNA-LCG key and a novel h...Implementation of message authentication code using DNA-LCG key and a novel h...
Implementation of message authentication code using DNA-LCG key and a novel h...
 
Distributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic WebDistributed Digital Artifacts on the Semantic Web
Distributed Digital Artifacts on the Semantic Web
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Improving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-CloudImproving Efficiency of Security in Multi-Cloud
Improving Efficiency of Security in Multi-Cloud
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
 
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
Exchange Protocols on Network File Systems Using Parallel Sessions Authentica...
 
Implementation of De-Duplication Algorithm
Implementation of De-Duplication AlgorithmImplementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
 
6222019 Originality Reporthttpsblackboard.nec.eduweb.docx
6222019 Originality Reporthttpsblackboard.nec.eduweb.docx6222019 Originality Reporthttpsblackboard.nec.eduweb.docx
6222019 Originality Reporthttpsblackboard.nec.eduweb.docx
 

More from SIR SUCCESS PRINCE DUAH DUAH

A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...SIR SUCCESS PRINCE DUAH DUAH
 
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...SIR SUCCESS PRINCE DUAH DUAH
 
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdfCURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdfSIR SUCCESS PRINCE DUAH DUAH
 
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...SIR SUCCESS PRINCE DUAH DUAH
 
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...SIR SUCCESS PRINCE DUAH DUAH
 
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdfHAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdfSIR SUCCESS PRINCE DUAH DUAH
 
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...SIR SUCCESS PRINCE DUAH DUAH
 
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...SIR SUCCESS PRINCE DUAH DUAH
 
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdfHAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdfSIR SUCCESS PRINCE DUAH DUAH
 
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...SIR SUCCESS PRINCE DUAH DUAH
 
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...SIR SUCCESS PRINCE DUAH DUAH
 
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...SIR SUCCESS PRINCE DUAH DUAH
 
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdfNOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdfSIR SUCCESS PRINCE DUAH DUAH
 
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...SIR SUCCESS PRINCE DUAH DUAH
 
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...SIR SUCCESS PRINCE DUAH DUAH
 
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...SIR SUCCESS PRINCE DUAH DUAH
 
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdfPUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdfSIR SUCCESS PRINCE DUAH DUAH
 
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...SIR SUCCESS PRINCE DUAH DUAH
 
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...SIR SUCCESS PRINCE DUAH DUAH
 
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...SIR SUCCESS PRINCE DUAH DUAH
 

More from SIR SUCCESS PRINCE DUAH DUAH (20)

A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
A CRITICAL STUDY OF THE IMPACT OF UNEMPLOYMENT ON VOTER TURNOUT IN SOME SELEC...
 
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
SUBMISSIVE RECOMMENDATIONS TO THE VISIONARY ACTIVITES OF THE SECRETARIAT FOR ...
 
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdfCURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
CURRICULUM VITAE-SIR SUCCESS PRINCE DUAH MENSAH.pdf
 
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
ITS TIME TO PLEDGE FOR A SUSTAINABLE HEALTHY PLANET- SIR SUCCESS PRINCE DUAH ...
 
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
HAPPY BIRTHDAY TO HIS EXCELLENCY JOHN DRAMANI MAHAMA- SUCCESS PRINCE DUAH MEN...
 
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdfHAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
HAPPY 39TH NATIONAL FARMERS DAY CELEBRATION- SUCCESS PRINCE DUAH MENSAH.pdf
 
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
ADVANCE THE COURSE OF WOMEN IN POLITICS- PARLIAMENT OF GHANA- SUCCESS PRINCE ...
 
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
CONGRATULATIONS ON YOUR CONFERMENT WITH AN HONORARY FELLOWSHIP- SUCCESS PRINC...
 
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdfHAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
HAPPY BIRTHDAY TO NAA ASHORKOR- PRINCE DUAH MENSAH.pdf
 
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
CONSTRUCTIVE ARGUMENT AND NEITHER NOT RELIGION NOR ETHNICITY- GHANA TODAY- SU...
 
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
 
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
AKOSOMBO DAM SPILLAGE- APOLOGISE AND SUPPORT THE AFFECTED INDIVIDUALS- PRINCE...
 
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdfNOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
NOMINATION-PAPER- SIR SUCCESS PRINCE DUAH MENSAH.pdf
 
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
EC-NOMINATION-FORM-DISTRICT-ASSEMBLY-ELECTIONS-1A-SIR SUCCESS PRINCE DUAH MEN...
 
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
LOVE AND AFFECTION FOR GHANA AND NOT FORCE- PEACE OVER EVERYTHING- PRINCE DUA...
 
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
GHANA WINS- PEACEFUL NPP PRESIDENTIAL PRIMARIES- SIR SUCCESS PRINCE DUAH MENS...
 
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdfPUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
PUT GHANA FIRST IN ELECTORAL PROCESS- SIR SUCCESS PRINCE DUAH MENSAH.pdf
 
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
UNDERSTANDING THE ROLE OF RESEARCH AND MENTORSHIP IN PROMOTING SUSTAINABLE QU...
 
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
ASSESSING THE EFFECTIVENESS OF OPEN SOURCE TO RESEARCH IN PROMOTING SUSTAINAB...
 
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
OPTIMIZING SAFE AND INCLUSIVE LEARNING ENVIRONMENT TO PROMOTE SUSTAINABLE QUA...
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

HMAC SHA 256- PROPOSED AUTHENTICATION ALGORITHM-PRINCE DUAH MENSAH-MPhil IT (2).pdf

  • 1. PRINCE DUAH MENSAH-MPHIL. I. T 1 AKENTEN APPIAH- MENKA UNIVERISTY OF SKILL TRAINING AND ENTREPRENEURIAL DEVELOPMENT HASH- BASED MESSAGE AUTHENTICATION CODE AND SECURE HASH FUNCTION 256 (A PROPOSED NOVEL AUTHENTICATION CODE) BY PRINCE DUAH MENSAH (8221520010) MIT 821 INFORMATION SECURITY
  • 2. PRINCE DUAH MENSAH-MPHIL. I. T 2 TABLE OF CONTENTS Abstract 3 1 Introduction 4 1.2 Purpose of the article 5 2 Literature Survey 6 2.1 Wide Area Networks 6 2.2 Message Authentication 6 2.3 Message Authentication Code 6 2.4 HMAC SHA 256 Algorithm 7 3 Methodology 8 3.1 Sources of Data Collection 8 3.2 HMAC SHA 256 Design Architecture 9 3.4 Research Instruments 10 4 Results and Discussion 12 4.1 Application of HMAC SHA 256 12 4.2 Collision Resistance of HMAC SHA 256 14 4.3 Time Complexity of HMAC SHA 256 16 5 Summary, Conclusion and Recommendation 20 5.1 Summary of Major Findings 20 5.2 Recommendation 21 5.3 Conclusion 21 6 Reference 22
  • 3. PRINCE DUAH MENSAH-MPHIL. I. T 3 ABSTRACT Conventional authentication methods, like simple text- based passwords, have shown vulnerabilities to different types of security attacks. Most of all the breaches involve credentials, whether stolen via social engineering or hacked using brute force. Therefore, a robust user authentication mechanism is crucial to have secure systems. Combining the use of a hash function, SHA 256 and a secret key. HMAC approach can be effective strategy for data origin authentication and integrity verification mechanisms. This article proposes a Hash- based Message Authentication Code and Secure Hash Algorithm 256, with the acronym HMAC SHA 256 to solve the deficiencies in Message Digest Method 5 including the traditional username- password authentication. HMAC SHA 256 can be applied to verification of email, authenticate data form, Internet of Things (IoT) and reset password. The novelty of the proposed mechanism lies in a Trust Based System which identifies the malicious nodes in the network and differentiates them from trusted nodes. The trust value of the participating nodes is increased only for every successful transmission and decreased for those nodes that do not send the data towards the desired destination. Using Java programming language, HTML, CSS and Python, the proposed authentication protocol was analysed to determine its efficiency and effectiveness. The study found that HMAC SHA 256 is ideal for higher performance systems and provides higher security as compared to MD 5. The study also revealed that HMAC SHA 265 has a strong collision resistance to attacks and its therefore recommended for encryption and solving the deficiencies in MD 5.
  • 4. PRINCE DUAH MENSAH-MPHIL. I. T 4 CHAPTER ONE INTRODUCTION Today, information is fundamental for basic operations in every home, institution, organization and the society at large. Information involves computers, networks and communication media which are used to transmit the data from one point to another. The power of attacks to guess or harvest passwords to gain illicit access to a system or data are becoming greater as the sophistication of password cracking techniques increases and high- power computing becomes more affordable. Routing in a distributed network has become a big challenge to network security and there has been various studies and many researches in this field attempting to propose more secure approach to it. Hence, there is an important need to have more robust and secure access mechanisms to protect data and systems. The most popular, yet the most basic, mechanism for user authentication is the use of Message Digest Method 5, mainly because the concept of using passwords is an efficient and cost effective solution for traditional user authentication. Nevertheless, this is the weakest level of authentication and it has been realized that Message Digest Method 5 is not reliable to provide adequate protection, due to several security threats. Verifying the integrity and authenticity of information is a prime necessity in computer networks as sensitive information are resident on computers and their networks. Hash- based Message Authentication Code and Secure Hash Algorithm 256 (HMAC SHA 256) was proposed to provide higher levels of safety and to add strong protection against account theft by greatly increasing the difficulty for attackers to gain access to information systems and data. MFA mechanisms are mostly based on a hash function, SHA 256 and a secret key HMAC. This article therefore proposes HMAC SHA 256 with a designed Trust Based System to make authentication mechanism more robust and secure and resolve the deficiencies in MD 5.
  • 5. PRINCE DUAH MENSAH-MPHIL. I. T 5 1.2 Purpose of the Article The main purpose of this article is to propose HMAC SHA 256 to make authentication mechanism more robust and secure and resolve the deficiencies in MD 5. The article specifically looks at: i. Application of the HMAC SHA 256 ii. Attack or collision resistance of HMAC SHA 256 compared with MD 5 iii. The performance and time complexity of the HMAC SHA 256
  • 6. PRINCE DUAH MENSAH-MPHIL. I. T 6 CHAPTER TWO LITERATURE SURVEY The literature survey entails the systematic identification and analysis of documents containing information related to the article. The literature survey section encompasses wide area networks, message authentication, message authentication code and HMAC SHA 256 Algorithm and its advantages and disadvantages. 2.1 Wide Area Networks A WAN is a data communications network that operates beyond the geographic scope of a Local Area Network. Wide Area Network use facilities provided by a service provider or carrier such as a telephone or cable company, to connect the locations of an organization to each other including to external services and remote users. Generally, Wide Area Networks carry a variety of traffic types such as voice, data and video. 2.2 Message Authentication Message Authentication is data authentication that shows that a message has not been modified while in transit and that the receiving party can verify the source of the message. Message authentication does not necessarily include the property of non- repudiation. It is typically achieved by using message authentication codes (MACs), authenticated encryption or digital signatures. 2.3 Message Authentication Code Message Authentication Code (MAC) is a string of code or a symmetric key cryptographic technique used to authenticate the origin and nature of a message. MACs use authentication cryptography to verify the legitimacy of data sent through a network or transferred from one person to another. Some of the Message Authentication Codes includes one- time message authentication code, carter- wegman message authentication code and hash- based authentication code.
  • 7. PRINCE DUAH MENSAH-MPHIL. I. T 7 2.4 HMAC SHA 256 ALGORITHM As encryption ensures only the confidentiality of the data being sent, a digital signature which is another security technique ensures other security goals like data authentication, non-repudiation and data integrity (Dilli & Chandra, 2014). HMACSHA256 is a type of keyed hash algorithm that is constructed from the SHA-256 hash function and used as a Hash-based Message Authentication Code (HMAC) Hashing can be used in place of the digital process in long data or messages. In this, the data or message is passed through an algorithm called cryptographic hash function or one way-hash function (SHA256) before signing. Hashing creates a compressed image of the data in the form of a hash value or message digest which is usually unique and much smaller than the message. Any change made to the message produces a different hash result even if the same hash function is used. Definition of HMAC-SHA256 HMAC-SHA256 defined as: 𝐻𝑀𝐴𝐶 (𝐾,𝑚) =𝐻((𝐾 ⊕ 𝑜𝑝𝑎𝑑) ║ 𝐻((𝐾 ⊕ 𝑖𝑝𝑎𝑑) ║ 𝑚)) which uses the following parameters: H = cryptographic hash function = SHA256 K = secret key m = message ║ = concatenation ⊕ = exclusive OR opad = outer padding ipad = inner padding
  • 8. PRINCE DUAH MENSAH-MPHIL. I. T 8 2.4.1 Advantages of HMAC SHA 256 Algorithm i. HMAC SHA 256 provides a high level of security due to its strength ii. It is practically impossible to reverse- engineer the original message from its hash value iii. It is resistant to various cryptographic attacks including collision and pre- image attacks. 2.4.2 Disadvantages of HMAC SHA 256 Algorithm i. HMACs uses shared key which may lead to non-repudiation. If either sender or receiver’s key is compromised then it will be easy for attackers to create unauthorized messages.
  • 9. PRINCE DUAH MENSAH-MPHIL. I. T 9 CHAPTER THREE METHODOLOGY This section of the article discusses the various methods that makes the Hash Message Authentication Code and Secure Hash Algorithm 256 an efficient choice over the other algorithms, including the sources of data collection, HMAC SHA 256 Design Architecture and research instruments. 3.1 Sources of Data Collection Information for this report was sourced from various secondary sources, all listed in the reference list. Data from publications by the 2013 International Conference on Electronic Engineering and Computer Science also proved valuable. This report is not a comprehensive analysis of the available literature but provides a broad overview of the algorithm. 3.2 HMAC SHA 256 Design Architecture HMAC utilizes two hash functions and its output is the same as that of the underlying hash function, (i.e. 256 bits concerning SHA-256). The HMAC architecture once powers up has to be initialized through activation of the input signal init. The initialization procedure corresponds to computing the hash values of two certain 512-bit blocks, which are the corresponding keys, and it is performed independently in the two SHA-256 cores at the same time. The 512-bit Xorskey component contains simple XOR gates to compute the values “k0 xor ipad” and “k0 xor ipad”, which are needed in HMAC’s initialization. This initialization process is completed after 33 clock cycles. When the above initialization finishes, the hash values from the outputs of the two SHA- 256 cores are stored and then are used as the new initial values (H1 – H1) by the two SHA- 256 cores. Since these two values and the corresponding keys must be protected and treated as secret, they are stored in registers. This is the first time that a 512-bit message block may
  • 10. PRINCE DUAH MENSAH-MPHIL. I. T 10 be supplied for process to the HMAC core and the sendmes handshake signal is activated indicating that the system can accept a new message so as to compute its HMAC value. Figure 3.1: HMAC-SHA-256 Architecture 3.3 Research Instruments Research instruments are tools used for data collection and analysis of the study. The following tools were used in analyzing HMAC-SHA-256 Algorithm: Java and Python Programming Languages, OpenSSL version 1.1.1 and Trust Based System. 3.3.1 Trusted Based System The Trust Based System identifies malicious nodes in the network and differentiates them from the trusted nodes by providing a trust value to the participating nodes. For every successful data transmission, the trust value increases but decreases for nodes that do not send data to their destination or whose data has been altered or tampered with. This system in addition to the HMAC-SHA256 algorithm provides additional security to transmitted data. The trust based system gives a trust value of every node on the network. The trust
  • 11. PRINCE DUAH MENSAH-MPHIL. I. T 11 value of a node or nodes increase if there is no attack on the sent data, this means the nodes are not malicious but decreases if malicious nodes exist. 3.3.2 Python Python is the most efficient cross- platform tool, specifically programming language used for artificial intelligence and machine learning solutions. 3.3.3 OpenSSL OpenSSL is an all-around cryptography library tool that offers an open-source application of the TLS protocol. It allows users to perform various SSL-related tasks, including CSR (Certificate Signing Request) and private keys generation, and SSL certificate installation. 3.3.4 Java Java is a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself. It is a fast, secure, reliable programming language for coding everything from mobile apps and enterprise software to big data applications and server-side technologies.
  • 12. PRINCE DUAH MENSAH-MPHIL. I. T 12 CHAPTER FOUR EXPERIMENTAL RESULTS AND DISCUSSION This section of the article presents the findings of the study whose main purpose is to propose a novel authentication protocol to resolve the deficiencies in the Message Digest Method 5 Algorithm. The presentation of findings aligns with the objectives of the article of the proposed novel HMAC SHA 256 Algorithm. Analyzing Algorithm means to study the specification of the Algorithm and come to a conclusion about how the implementation of that algorithm will perform in general. Here, the amount of resources necessary to execute the algorithm is determined and its equivalent running time (time complexity) or efficiency of the algorithm. 4.1 Application of the HMAC SHA 256 Figure 4.1 HMAC SHA 256 Computation Flow The above figure 4.1 indicates the HMAC SHA 256 Computation Flow. In Chapter 3, the figure 3.1 indicates the architecture of the proposed novel HMAC SHA 256 Algorithm, and this subsection is to analyse how it works. From figure 4.1 Once a message is sent to the HMAC architecture, the handshake signals new_mes is activated (for one clock cycle) indicating the arrival of a new input message with input rate of 64 (or more) bits per clock
  • 13. PRINCE DUAH MENSAH-MPHIL. I. T 13 cycle depending on the employed bus width. At the same time sendmes signal is deactivated (and stays deactivated) and the system starts formulating the 512-bit input message block which is over after 8 (or less) clock cycles (depending on the selected bus width). During these cycles, (and while another message may be in process on any stage of the two SHA-256 hashing cores) the first 128 bits of the 512-bit input message block are used to perform the necessary initializations in the Initialization Unit of the first SHA- 256 hashing core. This initialization ends in one clock cycle. After these 8 clock cycles have pass the processing on the first transformation round of the first SHA-256 hash core begins and the sendmes signal is activated again indicating that a new input message can be supplied to the HMAC design. The message that entered in the first SHA-256 core is processed, and finally after 32 clock cycles its 256-bit hash value exits the first SHA-256 core. It is then stored in the intermediate register REG_b, along with padding bits and length information about the input message block in the second SHA- 256 hashing core (message length is always the 256 bits that are produced from the first SHA-256 hashing core). The 256-bit hash value beyond the register REG_b, also feeds the initialization unit of the second SHA-256 core. So in the clock cycle that is needed for formulating the 512-bit input message for the second SHA-256 core (from the 256-bit output hash value from the first SHA-256 core), also the initialization for processing this message at the second SHA-256 core has been performed (at corresponding unit of the second SHA-256). Moreover, in the same clock cycle the necessary signals are generated so as to enable process at the second SHA-256 hashing core at the very next clock cycle. Then the rest process for the HMAC value computation begins in the second SHA256 hashing core which is also finalized after 32 clock cycles. Finally, after 65 clock cycles in total (32 for each one of the two SHA-256 cores and one clock cycle for the intermediate REG_b padding-register), the final HMAC value is computed. One clock earlier the handshake signal Hmac_ready is activated so as to notify the host system that at the next clock cycle the HMAC value can be retrieved.
  • 14. PRINCE DUAH MENSAH-MPHIL. I. T 14 4.2 Collision Resistance of HMAC SHA 256 The study was conducted using Trust Based System with one hundred nodes and the results are shown below: 19,10,32,33,40,41,43,45,47,49,82,83,84,85,94,95,97,98,86,87,88,89,90,91,92,93,96,99 and 100 act maliciously while nodes: 17, 18, 5, 11, 4, 12, 3, 20, 2, 9, 15, 1, 8, 16, 7, 13, 6, 14, 30, 31, 34, 35, 36, 37, 38, 39, 42, 44, 46, 48, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79 and 80 transferred data successfully and securely. Two nodes- node 19 and node 10, are considered malicious while others are trusted nodes. The study of the second set of 10 nodes gives: Keyed-Hash Message Authentication Code with Secure Hash Algorithm 256, HMAC-SHA256, was successfully implemented in a distributed network with the Trust Based System differentiating the malicious and non-malicious nodes in the network by reducing the trust value of any tampered node on the network. With this, more secure data can be transmitted in the network thereby accomplishing the aim of data authentication and data integrity Figure 4.2. The second set of 10 nodes studied
  • 15. PRINCE DUAH MENSAH-MPHIL. I. T 15 As shown in Figure 4.2, Start Dispatch button, Stop Dispatcher button, Reset Dispatcher button, Add node button and Make Malicious button are used to give room for interactivity. Start Dispatch button is used to initiate sending of data packets from one node to the other. Reset Dispatcher button on the other hand terminates sending of the data packets in client’s nodes. Reset Dispatcher button refreshes both the client and the server nodes while Add node button allows addition of desired number of nodes for the setup. Finally, Make Malicious button is used to make a node or more nodes to be malicious. Figure 4.5 Graphical representation of nodes ranging from 81 to 100 Figure 4.3: Graphical representation of users ranging from 51 to 60 Figure 4.4: Graphical representation of nodes ranging from 61 to 81
  • 16. PRINCE DUAH MENSAH-MPHIL. I. T 16 From the above study, specifically looking at the various figures, it can revealed that nodes 19, 10, 32, 33, 40, 41, 43, 45, 47, 49, 82, 83, 84, 85, 94, 95, 97, 98, 86, 87, 88, 89, 90, 91, 92, 93, 96, 99 and 100 acts maliciously based on various characteristics exhibited at the implementation stage while nodes 17, 18, 5, 11, 4, 12, 3, 20, 2, 9, 15, 1, 8, 16, 7, 13 ,6, 14, 30, 31, 34, 35, 36, 37, 38, 39, 42, 44, 46, 48, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79 and 80 are the trusted nodes. This implies that the proposed novel HMAC-SHA256 Algorithm with Trust Based System has a strong collision resistance or attack by detecting the untrusted nodes and separating them completely from the trusted ones. Additionally, HMAC-SHA256 is resistant to various cryptographic attacks, including collision and pre-image attacks. HMAC-SHA256 has the longest generated hash of 32 bytes and that makes it stronger to attacks or collision resistance than MD 5. 4.3 Performance and Time Complexity HMAC SHA 256 In this subsection, we are going to determine the performance or speed or time complexity of the algorithm, HMAC SHA 256 using Java. In order to test the speed sample code is used: import java.util.UUID; import org.apache.commons.codec.digest.DigestUtils; import org.apache.commons.lang.time.StopWatch; public class Test { private static final int TIMES = 1_000_000; private static final String UUID_STRING = UUID.randomUUID().toString(); public static void main(String[] args) { System.out.println(generateStringToHash()); System.out.println("MD5: " + md5());
  • 17. PRINCE DUAH MENSAH-MPHIL. I. T 17 System.out.println("SHA-1: " + sha1()); System.out.println("SHA-256: " + sha256()); System.out.println("SHA-512: " + sha512()); } public static long md5() { StopWatch watch = new StopWatch(); watch.start(); for (int i = 0; i < TIMES; i++) { DigestUtils.md5Hex(generateStringToHash()); } watch.stop(); System.out.println(DigestUtils.md5Hex(generateStringToHash())); return watch.getTime(); } public static long sha1() { ... System.out.println(DigestUtils.sha1Hex(generateStringToHash())); return watch.getTime(); } public static long sha256() { ... System.out.println(DigestUtils.sha256Hex(generateStringToHash())); return watch.getTime(); } public static long sha512() { ... System.out.println(DigestUtils.sha512Hex(generateStringToHash())); return watch.getTime(); } public static String generateStringToHash() { return UUID.randomUUID().toString() + System.currentTimeMillis(); } }
  • 18. PRINCE DUAH MENSAH-MPHIL. I. T 18 Aggregate Results Results from all iterations are aggregated and compared in the table below. There are 6 main cases. They are listed below and referenced in the table:  Case 1 – 36 characters length string, UUID is cached  Case 2 – 49 characters length string, UUID is cached and system time stamp is calculated each iteration  Case 3 – 49 characters length string, new UUID is generated on each iteration and system time stamp is calculated each iteration  Case 4 – 72 characters length string, UUID is cached  Case 5 – 85 characters length string, UUID is cached and system time stamp is calculated each iteration  Case 6 – 85 characters length string, new UUID is generated on each iteration and system time stamp is calculated each iteration All times below are per 1 000 000 calculations: Figure 4.7: Average Results
  • 19. PRINCE DUAH MENSAH-MPHIL. I. T 19 From the figure 4.7, HMAC SHA-256 is faster with 31% than SHA-512 only when hashing small strings. When the string is longer SHA-512 is faster with 2.9%. Time to get system time stamp is ~121.6 ms per 1M iterations. Time to generate UUID is ~670.4 ms per 1M iterations. It also competes favourably with MD 5.
  • 20. PRINCE DUAH MENSAH-MPHIL. I. T 20 CHAPTER FIVE SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATIONS The purpose of this article was to propose a novel authentication protocol to resolve the deficiencies in the Message Digest Method 5 Algorithm. This section presents the summary of the major findings from the analyses of data, and then, make recommendations and conclusion. 5.1 Summary of Major Findings In the first place, it was revealed HMAC SHA 256 computational flow that the HMAC process mixes a secret key with the message data, hashes the result with the hash function, mixes that hash value with the secret key again, and then applies the hash function a second time. The output hash is 256 bits in length. Secondly, the study shown that the proposed novel HMAC-SHA256 Algorithm with Trust Based System has a strong collision resistance or attack by detecting the untrusted nodes and separating them completely from the trusted ones. The HMAC-SHA256 algorithm is resistant to various cryptographic attacks, including collision and pre-image attacks. HMAC-SHA256 has the longest generated hash of 32 bytes and that makes it stronger to attacks or collision resistance than MD 5. Furthermore, the study revealed that the HMAC SHA-256 is faster with 31% than SHA- 512 only when hashing small strings. When the string is longer SHA-512 is faster with 2.9%. Time to get system time stamp is ~121.6 ms per 1M iterations. Time to generate UUID is ~670.4 ms per 1M iterations and this makes it competes favourably with MD 5.
  • 21. PRINCE DUAH MENSAH-MPHIL. I. T 21 5.2 Recommendation Based on the various findings, I will recommend the proposed novel HMAC SHA 256 Algorithm as an authentication encryption for web- based or online business rather than single- block hash function. 5.3 Conclusion The International Journal of Engineering Research and Technology (IJERT) on March 2014 in a paper titled, “Design of an HMAC CO- Processor Unit Based on SHA- 2 Family of Hash Functions” volume 3, issue3, conclude that “SHA- 2 with HMAC is completely feasible to efficiently replace MD 5 with SHA- 2 in hardware implementations of HMAC”. In conclusion, this article seeks to confirm the submission from IJERT that the proposed novel HMAC SHA 256 is the ideal authentication algorithm to solve the deficiencies in MD 5 as it a has higher performance and a higher security or stronger collision resistance to attacks and its therefore recommended for encryption.
  • 22. PRINCE DUAH MENSAH-MPHIL. I. T 22 REFERENCE Bonneau, J.; Herley, C.; Van Oorschot, P.C.; Stajano, F (2015). Passwords and the evolution of imperfect authentication. Commun., 58, 78–87. Furnell, S & Warren, M. (1999), ‘Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium?’ Computers and Security, vol. 18, no. 12, pp. 28-34. Frank, H & Katz, (2010), ‘WPA vs. WPA2: Is WPA2 Really an Improvement on WPA?’, 4th Annual Computer Security Conference, Coastal Carolina University, Myrtle Beach, SC. vol. 4, no. 5, pp 9-15 Joan, D & Vincent, R (2002), ‘The Design of Rijndael: AES -The Advanced Encryption Standard (Information Security and Cryptography)’, 2nd edn, Springer, USA, pp 76-38. Joon, S. P & Derrick, D (2003), ‘WLAN Security: Current and Future’, IEEE Computer Society, Syracuse University, NY, USA. Pp 12-14. Labib, K 2004, ‘Computer Security and Intrusion Detection’, Crossroads, vol. 11, no. 1 pp. 2-4. Mohammed, F & Shawkat, A (2015), ‘Recurrent security gaps in 802.11ac routers’, International journal of scientific & technology research vol. 4, no. 9, pp 12-14. Newman, R (2006), ‘Cybercrime, Identity Theft and Fraud: Practicing Safe Internet – Network Security Threats and Vulnerabilities’, Proceedings of the 3rd Annual Conference on Information Security Curriculum Development. New York, USA, vol. 6, no. 3, pp. 68-78. Park, JS. & Dicoi, D. (2003), ‘WLAN security: current and future’, IEEE Internet Computing, vol. 7, no. 5, pp. 60–65.