1 / 32

Understanding Cryptographic Hash Functions and Digital Signatures

This abstract discusses Cryptographic hash functions, Message authentication codes, HMAC, CBC-MAC, Digital signatures encryption/decryption. It explores message confidentiality and authentication in encryption techniques. Construction of collision-resistant hash functions from compression functions through Merkle-Damgard construction is explained.

magan
Download Presentation

Understanding Cryptographic Hash Functions and Digital Signatures

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptographic Hash FunctionsMessage AuthenticationDigital Signatures

  2. Abstract We will discuss • Cryptographic hash functions • Message authentication codes • HMAC and CBC-MAC • Digital signatures

  3. Encryption/Decryption • Provides message confidentiality. • Does it provide message authentication?

  4. Collision-resistant hash functions can be built from collision-resistant compression functions using Merkle-Damgard construction.

  5. Merkle-Damgard Construction m1 m2 m3 mk v0 v1 v2 vk h(m) … f f f f IV

  6. m = m1 m2 m3 ms Xhk(m) h(m) … f f kX f f IV ms+1 f hk(m) hk(m||ms+1)

  7. Cipher Block Chaining (CBC)

  8. Message m MACk(m) Message m Sigpr(m)

  9. Encryption (using RSA): Bob Alice PRBob PUBob E C D M M Digital signature (using RSA-1): Bob Alice PRBob PUBob E(S) =M? E S D M Verify Sign

More Related