Authentication Requirement, Authentication Function Flashcards
(16 cards)
What is the purpose of authentication in communication?
To verify the origin and authenticity of a document or message.
What must authentication be able to verify?
- The message came from the apparent source or author.
- The contents have not been altered.
- Sometimes, the message was sent at a specific time or in a certain sequence.
What type of attack does authentication protect against?
Active attacks such as falsification of data and transactions.
What are the two levels of authentication functionality?
- Lower Level: Produces an authenticator (value used to authenticate a message).
- Higher Level: Uses the authenticator to verify message authenticity.
What are the types of functions that may be used to produce an authenticator?
- Message encryption
- Message authentication code (MAC)
- Hash function
How is message authentication achieved using encryption?
The ciphertext of the entire message serves as its authenticator.
What is a MAC?
A function of the message and a secret key that produces a fixed-length value for authentication.
How is a MAC used in communication?
- MAC = F(K, M) is calculated.
- MAC is appended to the message.
- Receiver recomputes MAC and compares it to the received MAC.
What does successful MAC verification assure?
The message is from the claimed sender and has not been altered.
How is DES used in MAC?
It encrypts the message, and the last 16 or 32 bits of ciphertext are used as the MAC.
What is a one-way hash function?
A function that takes a variable-size message and returns a fixed-size message digest.
Does a one-way hash function use a secret key?
No.
How does using conventional encryption with a hash function ensure authenticity?
The message digest is encrypted using a shared secret key, ensuring only sender and receiver can verify authenticity.
How does public-key encryption of a hash ensure authentication?
- Provides a digital signature.
- Removes the need to distribute secret keys between parties.
How is a secret value used in hashing for authentication?
- A and B share a secret value SAB.
- Sender computes MDM = H(SAB || M) and sends [M || MDM].
- Receiver verifies by computing the same hash.