Authentication, Hash Functions, Digital Signatures

Message Authentication

Authentication using Private-key Ciphers

Hashing Functions

Snefru

MD2, MD4 and MD5

R L Rivest, "The MD4 Message Digest Algorithm", Advances in Cryptology - Crypto'90, Lecture Notes in Computer Science No 537, Springer-Verlag 1991, pp303-311

SHA (Secure Hash Algorithm)

Other Hash Functions

HAVAL

Using Private Key Ciphers

Digital Signature Schemes

RSA

El Gamal Signature Scheme

Example of ElGamal Signature Scheme

DSA (Digital Signature Algorithm)

Other Signature Schemes

Fiat-Shamir

Schnorr

Key Management

Authentication Protocols

Challenge-Response

Needham-Schroeder

R M Needham, M D Schroeder, "Using Encryption for Authentication in Large Networks of Computers", CACM, 21(12), Dec 1978, pp993-998 Message 1 A -> S A, B, Na

Message 2 S -> A EKas{Na , B, Kab, EKbs{Kab, A} }

Message 3 A -> B EKbs{Kab, A}

Message 4 B -> A EKab{Nb}

Message 5 A-> B EKab{Nb-1}

nb: Na is a random value chosen by Alice, Nb random chosen by Bob

Kerberos - An Example of a Key Server

Kerberos - Initial User Authentication

Kerberos - Request for a Remote Service

Kerberos - in practise

X.509 - Directory Authentication Service

X.509 Certificate

CA Hierarchy

Authentication Procedures

One-Way Authentication

Two-Way Authentication

Three-Way Authentication

Security in Practise - Secure Email

PEM

PEM - Key Management

PGP

PGP - In Use

Sample PGP Message

-----BEGIN PGP SIGNED MESSAGE-----

May all your signals trap
May your references be bounded
All memory aligned
Floats to ints be rounded

Lawrie
-----BEGIN PGP SIGNATURE-----
Version: 2.3
iQBzAgUBLdl1RILpoub8ek7fAQF2nwLuJwVPh8iiFrksXSCe6z37ZdV37pXvsYyz0WAnCBCdpu55yId5/kVhmvusTo10zUHPssPwB99TQq9YsduSfkVeILjfJNJEuUWQkJl8dWvaB+IIEEodF0Xpbc23krnuOA==
=hn90
-----END PGP SIGNATURE-----

PGP - Issues

Security in Practise - SNMP

User Authentication

(ref Davies Ch 7)

What you Know

Passwords or Pass-phrases

Denning Computer (In)security Fig 2 & 3, pp111-12

One-shot Passwords

  • either generate a printed list, and keep matching list on system to be accessed (cf home banking)
  • or use an algorithm based on a one-way function f (eg MD5) to generate previous values in series (eg SKey)
  • generally good only for infrequent access

    What you Have

    Magnetic Card, Magnetic Key

    Smart Card or Calculator

    Davies fig 7.7 & 7.8 pp184-84

    What you Are

    Davis fig 7.12 p195


    [1] see Schneier p322
    [2] follow with Schneier pp330-332
    [3] follow with Schneier pp334-335
    [4] see Dieter Gollman, Thomas Beth, Frank Damm, "Authentication Services in Distributed Systems", Computers & Security, 12(8), 1993, pp753-764
    [5] see Anish Mathuria, "Automating Ban Logic", MSci(Hons), University of Wollongong, 1993
    [CSC Info]
    Lawrie.Brown@adfa.oz.au / 22-May-96