Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.

Similar presentations


Presentation on theme: "Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering."— Presentation transcript:

1 Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering University of Wisconsin-Platteville

2 8: Network Security8-2 Message Authentication Code m s (shared secret) (message) H(. ) H(m+s) public Internet append m H(m+s) s compare m H(m+s) H(. ) H(m+s) (shared secret)

3 8: Network Security8-3 MACs in practice r MD5 hash function widely used (RFC 1321) m computes 128-bit MAC in 4-step process. m arbitrary 128-bit string x, appears difficult to construct msg m whose MD5 hash is equal to x recent (2005) attacks on MD5 r SHA-1 is also used m US standard [ NIST, FIPS PUB 180-1] m 160-bit MAC m Vulnerable to theoretical attacks

4 8: Network Security8-4 Digital Signatures cryptographic technique analogous to hand- written signatures. r sender (Bob) digitally signs document, establishing he is document owner/creator. r verifiable, nonforgeable: recipient (Alice) can prove to someone that Bob, and no one else (including Alice), must have signed document

5 8: Network Security8-5 Digital Signatures simple digital signature for message m: r Bob “signs” m by encrypting with his private key K B, creating “signed” message, K B (m) - - Dear Alice Oh, how I have missed you. I think of you all the time! …(yada yada yada) Bob Bob’s message, m public key encryption algorithm Bob’s private key K B - K B - Bob’s message, m, signed (encrypted) with his private key (m)

6 8: Network Security8-6 Digital Signatures (more) r suppose Alice receives msg m, digital signature K B (m) r Alice verifies m signed by Bob by applying Bob’s public key K B to K B (m) then checks K B (K B (m) ) = m. r if K B (K B (m) ) = m, whoever signed m must have used Bob’s private key. + + - - -- + Alice thus verifies that: ü Bob signed m. ü No one else signed m. ü Bob signed m and not m’.

7 8: Network Security8-7 large message m H: hash function H(m) digital signature (encrypt) Bob’s private key K B - + Bob sends digitally signed message: Alice verifies signature and integrity of digitally signed message: K B (H(m)) - encrypted msg K B (H(m)) - encrypted msg large message m H: hash function H(m) digital signature (decrypt) H(m) Bob’s public key K B + equal ? Digital signature = signed MAC

8 8: Network Security8-8 Public Key Certification public key problem: r When Alice obtains Bob’s public key (from web site, e-mail, etc.), how does she know it is Bob’s public key, not Trudy’s? solution: r trusted certification authority (CA)

9 8: Network Security8-9 Certification Authorities r Certification Authority (CA): binds public key to particular entity, E. r E registers its public key with CA. m E provides “proof of identity” to CA. m CA creates certificate binding E to its public key. m certificate containing E’s public key digitally signed by CA: CA says “This is E’s public key.” Bob’s public key K B + Bob’s identifying information digital signature (encrypt) CA private key K CA - K B + certificate for Bob’s public key, signed by CA - K CA (K ) B +

10 8: Network Security8-10 Certification Authorities r when Alice wants Bob’s public key: m gets Bob’s certificate (Bob or elsewhere). m apply CA’s public key to Bob’s certificate, get Bob’s public key Bob’s public key K B + digital signature (decrypt) CA public key K CA + K B + - K (K ) B +


Download ppt "Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering."

Similar presentations


Ads by Google