Ask
Search
Ask Question
Login
×
×
Welcome back.
and 5 others joined a min ago.
Continue with Google
Continue with email
0
4.7k
views
What is message digest? Explain HMAC algorithm?
written
8.4 years ago
by
teamques10
★
68k
• modified 4.7 years ago
cryptography and system security
ADD COMMENT
FOLLOW
SHARE
EDIT
1 Answer
0
28
views
written
8.4 years ago
by
teamques10
★
68k
A hash function accepts a variable size message M as input and produces a fixed sized output, referred to as Hash code H (M).
(Unlike a MAC) Hash code doesn’t use any key but it is a function of only input message.
The hash code is also referred to as message digest or hash value.
Hash code is a function of all the bits of message digest or hash value.
Hash code is a a function of all the bits of message and provides an error detection capability.
A change in any bit or bits in the message results in change of the hash code.
The following figure shows various ways in which a hash code can be used to provide message authentication.
Symmetric encryption
Authentication ( Only A and B share key K)
Confidentiality ( Encryption is applied to entire message)
Authentication
Only has code encrypted using symmetric encryption.
Reduces processing burden for those applications that do not require confidentiality.
Only hash functions code is encrypted using public key encryption and using sender’s private key.
This provides authentication and digital signature.
Message plus the private key encrypted hash code is encrypted hash code is encrypted using symmetric secret key.
Provides authentication (Only A and B know secret key )
Confidentiality and digital signature (Entire message is used at encryption)
The technique assumes that the 2 communication parties share a common secret value S.
It computes hash value over the concentration of M and S (M || S) and appends resulting value to M.
Because B possesses S it can recomputed hash value to verify.
Because the secret value itself is not sent, an opponent can’t modify an intercepted message and hence can’t generate false message.
Provides authentication (Only A and B share S)
Provides authentication only A and B shares.
Provides confidentiality encrypting entire message plus hashcode.
ADD COMMENT
SHARE
EDIT
Please
log in
to add an answer.
Community
Users
Levels
Badges
Content
All posts
Tags
Dashboard
Company
About
Team
Privacy
Submit question paper solutions and earn money