Most used MDC & MAC Flashcards Preview

Protocols and Algorithms for Network Security [pme] > Most used MDC & MAC > Flashcards

Flashcards in Most used MDC & MAC Deck (20):
1

What does MD5 stands for?

MD5 stands for message digest 5

2

What does SHA stands for?

SHA stands for Secure hash algorithm.

3

When MD5 must not be considered to be used?

MD5 must not be considered to be used if collision resistance is required.

4

How do MD5 and SHA-1 compare related to speed?

MD5 is 25% faster than SHA1

5

How do MD5 and SHA1 compare related to simplicity?

Both are simple in all aspects

6

How do MD5 and SHA1 compare regarding to security?

SHA1 offers better security agains brute force and birthday attacks

7

What are the commonly used modification detection codes (MDCs)?

MD5 and SHA1

8

Which are the commonly used message authentication codes (MACs)?

DES-CBC-MAC (Data encryption standard in cipher block chaining mode) and HMAC (Hashed message authentication code)

9

How does CBC-MAC (cipher block chaining message authentication code) work?

A CBC-MAC is computed by encrypting a message in CBC mode and taking the last ciphertext block or a part of it as the MAC. This MAC do not need to be signed any further as it has already been produced using a shared secret K.

10

What does CBC-MAC stands for?

cipher block chaining message authentication code

11

what does DES-CBC-MAC stands for?

Data encryption standard in cipher block chaining mode

12

What does HMAC stands for?

Hashed message authentication code

13

Can CBC-MAC be used to check non-repudiation?

No since it is not possible to say exactly who has created a MAC (sender and receiver have the key k).

14

With which kind of cipher can CBC-MAC be used?

This scheme works with any block cipher.

15

How is the security of CBC-MAC against birthday attacks?

Good as an attacker does not know k the birthday attack is much more dificult to launch (if not impossible) allowing shorter MACs.

16

How can CBC-MAC security be strengthened?

both parts should agree upon a second key k' different from k and performin a triple encryption on the LAST block: MAC = E(K;D(K';E(K;Cn-1))) doubling the key space while adding only little computing effort.

17

Why are symmetric blocks ciphers not used to create modification detection codes(MDCs)?

relatively small block size of 64 bits offers insufficient security against birthday attacks and they require more computing than cryptographic hash function so they are more slow.

18

Why construct message authentication codes (MACs) from modification detection codes (MDCs)?

Cryptographic hash function generally executes faster than symmetric block cphers and there are no export restrictions to cryptographic hash functions.

19

What is the basic idea of constructing message authentication codes (MACs) from modification detection codes (MDCs)?

To "mix" a secret key k with the input and compute an modification detection code (MDC).

20

How is the construction of HMAC?

HMAC construction is H(K || p 1 || H(K || p 2 || m)) where p1 and p2 are padding patterns to fill up the key to one input block of the cryptographic hash function.