We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byChloe Lopez
Modified over 2 years ago
Symmetric Message Authentication Codes Prof. Ravi Sandhu
2 © Ravi Sandhu MESSAGE AUTHENTICATION CODES MAC Algorithm M Verification Algorithm V Plain- text Yes/No Plaintext + MAC INSECURE CHANNEL K A A B B K MAC = MD of plaintext + K
3 © Ravi Sandhu CURRENT GENERATION MAC ALGORITHMS HMAC-MD5, HMAC-SHA IETF standard general technique for constructing a MAC from a message digest algorithm Older MACs are based on secret key encryption algorithms (notably DES) and are still in use DES based MACs are 64 bit and not considered strong anymore
4 © Ravi Sandhu HMAC HMAC computation HMAC K (M) = h(K opad || h(K ipad || M) ) h is any message digest function M message K secret key opad, ipad: fixed outer and inner padding HMAC-MD5, HMAC-SHA
Asymmetric Digital Signatures And Key Exchange Prof. Ravi Sandhu.
PKI Introduction Ravi Sandhu 2 © Ravi Sandhu 2002 CRYPTOGRAPHIC TECHNOLOGY PROS AND CONS SECRET KEY SYMMETRIC KEY Faster Not scalable No digital signatures.
Asymmetric Encryption Prof. Ravi Sandhu. 2 © Ravi Sandhu PUBLIC KEY ENCRYPTION Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text Ciphertext.
Symmetric Encryption Prof. Ravi Sandhu. 2 © Ravi Sandhu SECRET KEY CRYPTOSYSTEM Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text.
Hashes and Message Digests Nick Feamster CS 6262: Network Security Spring 2009.
ISA 662 SSL Prof. Ravi Sandhu. 2 © Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later.
Chapter 3 Public Key Cryptography and Message authentication.
A. Steffen, , KSy_Auth.ppt 1 Zürcher Hochschule Winterthur Kommunikationssysteme (KSy) - Block 9 Secure Network Communication Part III Authentication.
Cryptography (One Day Cryptography Tutorial) By Dr. Mohsen M. Tantawy.
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
Cryptography Ch-1 prepared by: Diwan. Essential Terms Cryptography Encryption Plain text Cipher text Decryption Cipher text Plain text Cryptanalysis Cryptology.
Chapter 4: Modes of Operation CS 472: Fall Encrypting a Large Massage 1.Electronic Code Book (ECB) 2.Cipher Block Chaining (CBC) 3.Output Feedback.
Md. Kamrul Hasan Assistant Professor and Chairman Computer and Communication Engineering Dept. Network Security.
Peer-to-peer and agent-based computing Security in Distributed Systems.
H.235 Authentication, Integrity and Encryption Adi Regev Sr. Director Sales Engineering & Customer Support.
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Merkle Damgard Revisited: how to Construct a hash Function Jean-Sebastien Coron Yevgeniy Dodis Cecile Malinaud Prashant Puniya.
1 DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970s as a US government standard The.
Seminar on (ENCODING AND DECODING TECHNIQUES)
An Introduction to Distributed Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
ISA 662 Internet Security Protocols Kerberos Prof. Ravi Sandhu.
Ethical Hacking Module XXI Cryptography. EC-Council Module Objective What is PKI RSA MD-5 SHA SSL PGP SSH Encryption Cracking Techniques.
ISA 662 IKE Key management for IPSEC Prof. Ravi Sandhu.
Security and Privacy over the Internet Chan Hing Wing, Anthony Mphil Yr. 1, CSE, CUHK Oct 19, 1998.
Block Cipher Modes of Operation and Stream Ciphers CSE 651: Introduction to Network Security.
Security – Keys, Digital Signatures and Certificates I CS3517 Distributed Systems and Security Lecture 19.
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
© 2016 SlidePlayer.com Inc. All rights reserved.