home | articles | links | fun | about
Up to: CS432 Information Security

Data Integrity for Communications (9/24/02)

Model

Can't solve with hashes alone (public hash function)

Use a message authentication code (MAC)

Not a MAC address (used in networking)

Alice has data d, computes m = MAC(K,d)

Properties of MAC

One more detail

Making a MAC

First try: Hash (doesn't work)

Second try: Hash (doesn't work)

HMAC: the MAC of choice

Using MACs

Challenge/response login protocol

Users carry own password info

New problem: confidentiality of messages

Alice sends d0, d1, d2 ... to Bob

Goal: prevent Zeke from learning d0, d1, d2...

Use a "cipher" or "encryption algorithm"

Cipher model