Security Hash Algorithm (SHA) was developed in 1993 by the National Institute of Standards and Technology (NIST) and National Security Agency (NSA).
It was designed as the algorithm to be used for secure hashing in the US Digital Signature Standard.
• Hashing function is one of the most commonly used encryption methods. A hash is a special mathematical function that performs one-way encryption.
• SHA-l is a revised version of SHA designed by NIST and was published as a Federal Information Processing Standard (FIPS).
• Like MD5, SHA-l processes input data in 512-bit blocks.
• SHA-l generates a 160-bit message digest. Whereas MD5 generated message digest of 128 bits.
• The procedure is used to send a non secret but signed message from sender to receiver. In such a case following steps are followed:
1. Sender feeds a plaintext message into SHA-l algorithm and obtains a 160-bit SHA-l hash.
2. Sender then signs the hash with his RSA private key and sends both the plaintext message and the signed hash to the receiver.
3. After receiving the message, the receiver computes the SHA-l hash himself and also applies the sender's public key to the signed hash to obtain the original hash H.
Key management: Introduction, How public key distribution done, Diffie Hellman Key Exchage Algorithm,Digital Certificate. Key Management using Digital certificate is done etc. wireshark screenshot showing digital cetificate.
Pgp-Pretty Good Privacy is the open source freely available tool to encrypt your emails then you can very securely send mails to others over internet without fear of eavesdropping by cryptanalyst.
Security Hash Algorithm (SHA) was developed in 1993 by the National Institute of Standards and Technology (NIST) and National Security Agency (NSA).
It was designed as the algorithm to be used for secure hashing in the US Digital Signature Standard.
• Hashing function is one of the most commonly used encryption methods. A hash is a special mathematical function that performs one-way encryption.
• SHA-l is a revised version of SHA designed by NIST and was published as a Federal Information Processing Standard (FIPS).
• Like MD5, SHA-l processes input data in 512-bit blocks.
• SHA-l generates a 160-bit message digest. Whereas MD5 generated message digest of 128 bits.
• The procedure is used to send a non secret but signed message from sender to receiver. In such a case following steps are followed:
1. Sender feeds a plaintext message into SHA-l algorithm and obtains a 160-bit SHA-l hash.
2. Sender then signs the hash with his RSA private key and sends both the plaintext message and the signed hash to the receiver.
3. After receiving the message, the receiver computes the SHA-l hash himself and also applies the sender's public key to the signed hash to obtain the original hash H.
Key management: Introduction, How public key distribution done, Diffie Hellman Key Exchage Algorithm,Digital Certificate. Key Management using Digital certificate is done etc. wireshark screenshot showing digital cetificate.
Pgp-Pretty Good Privacy is the open source freely available tool to encrypt your emails then you can very securely send mails to others over internet without fear of eavesdropping by cryptanalyst.
This material covers Authentication requirement, Authentication function, MAC, Hash function, Security of hash function and MAC, SHA, Digital signature and authentication protocols, DSS, Authentication protocols like Kerberos and X.509, entity authentication
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
cmcs
MACs based on Block Ciphers
Digital Signature
Properties , Requirements and Security of Digital Signature
Various digital signature schemes ( Elgamal and Schnorr )
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
this is about international data encryption algorithm. this is first ever ppt which includes its history, encryption , figure, decryption and application.. do share ur views after viewing it if u like..
This material covers Authentication requirement, Authentication function, MAC, Hash function, Security of hash function and MAC, SHA, Digital signature and authentication protocols, DSS, Authentication protocols like Kerberos and X.509, entity authentication
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
cmcs
MACs based on Block Ciphers
Digital Signature
Properties , Requirements and Security of Digital Signature
Various digital signature schemes ( Elgamal and Schnorr )
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
this is about international data encryption algorithm. this is first ever ppt which includes its history, encryption , figure, decryption and application.. do share ur views after viewing it if u like..
This material covers Authentication requirement, Authentication function, MAC, Hash function, Security of hash function and MAC, SHA, Digital signature and authentication protocols, DSS, Authentication protocols like Kerberos and X.509, entity authentication
Is your crypto secure? Let's take a look at what main issues there are in modern cryptography that software developers and architects have to be aware of.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Message Authentication Code & HMAC
1.
2. Similar to Message Digest
Shared Symmetric (Secret) key is used for
encryption
Message authentication is concerned with:
◦ protecting the integrity of a message
◦ validating identity of originator
◦ non-repudiation of origin (dispute resolution)
consider the security requirements
3.
4. MAC generation of message using shared
symmetric (secret) key.
Sends original message and MAC(H1)
At receiver end, it receives original message and
MAC
Receiver calculate MAC(H2) using key and
original message.
Compare H1 & H2
◦ If H1!=H2 then, Message altered
◦ If H1==H2 then, Message not changed
5. Generated by an algorithm that creates a small
fixed-sized block
◦ depending on both message and some key
◦ like encryption though need not be reversible
appended to message as a signature
receiver performs same computation on message
and checks it matches the MAC
provides assurance that message is unaltered and
comes from sender
6.
7. As shown the MAC provides confidentiality
can also use encryption for secrecy
◦ generally use separate keys for each
◦ can compute MAC either before or after encryption
◦ is generally regarded as better done before
why use a MAC?
◦ sometimes only authentication is needed
◦ sometimes need authentication to persist longer than
the encryption (eg. archival use)
Note that a MAC is not a digital signature
8. HMAC stands for -Hash Message
Authentication Code
Mandatory for security implementation for
Internet Protocol security.
Idea of HMAC is to reuse existing Message-
Digest algorithms(such as MD5,SHA-1..)
Uses shared symmetric key to encrypt
message digest.
9.
10. Variables used in HMAC
◦ MD = the message digest/hash function used(e.g.
MD5,SHA-1,etc.)
◦ M = the input message whose MAC is to be
calculated.
◦ L = the number of blocks in the message M.
◦ b = the numbers of bits in each block.
◦ K = the shared symmetric key to be used in HMAC.
◦ ipad = A string 00110110 repeated b/8 times.
◦ opad = A string 01011010 repeated b/8 times.
11. STEP-1 Make the length of K equal to b.
STEP-2 XOR K with lpad to produce S1.
STEP-3 Append M to S1.
STEP-4 Message-digest algorithm.
STEP-5 XOR K with opad to produce S2.
STEP-6 Append H to S2.
STEP-7 Message-digest algorithm.
12. STEP-1 Make the length of K equal to b.
◦ If length of K<b : add 0 bit as required to the left of k
◦ If length of K=b : In this case, we do not take any action, and
proceed to step 2.
◦ If length of K>b : we need to trim k, for this, we pass K through
the message-digest algorithm(H) selected for this particular
instance of HMAC
13. STEP-2 XOR K with lpad to produce S1
◦ XOR K (the output of step 1) and ipad to produce a variable
called S1.
14. STEP-3 Append M to S1
◦ Take the original message (M) and simply append it to the end of
S1.
15. STEP-4 Message-digest algorithm
◦ The selected message-digest algorithm (e.g. MD5,SHA-l, etc.) is
applied to the output of step 3.
16. STEP-5 XOR K with opad to produce S2
◦ XOR K (the output of step 1) with opad to produce a variable
called as S2.
17. STEP-6 Append H to S2
◦ Append the message digest calculated in step 4 to the end of S2.
18. STEP-7 Message-digest algorithm
◦ the selected message-digest algorithm (e.g. MD5, SHA-I, etc.) is
applied to the output of step 6 (i.e. to the concatenation of S2 and
H). This is the Final MAC that we want
19. 1. Key exchange is main issue
2. Somehow the key-exchange problem is resolved,
HMAC cannot be used if the number of receivers is
greater than one.
3. If multiple parties share the same symmetric key.
How does a receiver know that the message was
prepared and sent by the sender
4. Replay of Message
Editor's Notes
Can also use block cipher chaining modes to create a separate authenticator, by just sending the last block. However this suffers from being a bit too small for acceptable use today.
These are the specifications for good hash functions. Essentially it must be extremely difficult to find 2 messages with the same hash, and the hash should not be related to the message in any obvious way (ie it should be a complex non-linear function of the message). There are quite a few similarities in the evolution of hash functions & block ciphers, and in the evolution of the design requirements on both.