SlideShare a Scribd company logo
SRI KRISHNA COLLEGE OF ENGINEERING AND TECHNOLOGY
Kuniamuthur, Coimbatore, Tamilnadu, India
An Autonomous Institution, Affiliated to Anna University,
Accredited by NAAC with “A” Grade & Accredited by NBA (CSE, ECE, IT, MECH ,EEE, CIVIL& MCT)
COURSE MATERIALMATERIAL
Course : 20EC603 – Fundamentals of Network Security
Module - 2: Public Key Cryptography and authentication
requirements
Topics : Message authentication code and Hash
functions
www.skcet.ac.in
2
Outline
 Cryptographic Hash Functions
 Applications
 Simple hash functions
 Requirements and security
 Hash functions based on Cipher Block Chaining
 Secure Hash Algorithm (SHA)
3
Hash Function
 A hash function H accepts a
variable-length block of data M
as input and produces a fixed-
size hash value h = H(M).
 A “good” hash function has the
property that the results of
applying a change to any bit or
bits in M results, with high
probability, in a change to the
hash code.
4
Input-Output behaviour of hash functions
Alice was beginning to get very tired of
sitting by her sister on the bank, and have
nothing to do.
I am not a crook
I am not a cook H
H
H DFDC349A
FB93E283
A3F4439B
Message Message
digest
5
Requirements for hash functions
1. Can be applied to any length of message M.
2. Produces fixed-length output h.
3. It is easy to compute h=H(M) for any message M.
4. Given hash value h is infeasible to find y such that (H(y) = h)
• One-way property (In other words, given a fingerprint, we
cannot derive a matching message).
5. For given block x, it is computationally infeasible to find
y ≠ x with H(y) = H(x)
• Weak collision resistance
6. It is computationally infeasible to find messages m1 and m2 with
H(m1) = H(m2)
• Strong collision resistance
6
Simple Hash Function
 The input (message, file, etc.) is viewed as a sequence of n-bit
blocks.
 The input is processed one block at a time in an iterative fashion
to produce an n-bit hash function.
 One of the simplest hash functions is the bit-by-bit exclusive-OR
(XOR) of every block.
𝑪𝒊 = 𝒃𝒊𝟏 ⊕ 𝒃𝒊𝟐 ⊕ … ⊕ 𝒃𝒊𝒎
Where,
𝐶𝑖 = ith bit of the hash code 1 ≤ i ≤ n
m = number of n-bit blocks in the input
𝑏𝑖𝑗 = ith bit in jth block
Ad

More Related Content

Similar to 2.15 Message Authentication Code and Hash Functions.pptx (20)

A Modified approach for implementation of an efficient padding scheme in a di...
A Modified approach for implementation of an efficient padding scheme in a di...A Modified approach for implementation of an efficient padding scheme in a di...
A Modified approach for implementation of an efficient padding scheme in a di...
dannyijwest
 
Cns
CnsCns
Cns
ArthyR3
 
Cryptography and network_security
Cryptography and network_securityCryptography and network_security
Cryptography and network_security
Janani Satheshkumar
 
Concepts of BlockChain explained very well
Concepts of BlockChain explained very wellConcepts of BlockChain explained very well
Concepts of BlockChain explained very well
panickerp23092
 
Cryptography and Network Security Principles and Practice.docx
Cryptography and Network Security Principles and Practice.docxCryptography and Network Security Principles and Practice.docx
Cryptography and Network Security Principles and Practice.docx
richardnorman90310
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Tony Nguyen
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
David Hoen
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Fraboni Ec
 
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithms
Harry Potter
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Luis Goldster
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
James Wong
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Young Alista
 
cryptography module-5 cyber securityantipatterns ,
cryptography module-5 cyber securityantipatterns ,cryptography module-5 cyber securityantipatterns ,
cryptography module-5 cyber securityantipatterns ,
shaziasulthana2
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
chauhankapil
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
Khulna University, Khulna, Bangladesh
 
Unit 3
Unit 3Unit 3
Unit 3
tamil arasan
 
NSC_Unit-III_final.ppt
NSC_Unit-III_final.pptNSC_Unit-III_final.ppt
NSC_Unit-III_final.ppt
DrVASAVIBANDE
 
Hash Function(Grostl) and Contex Hull Research paper
Hash Function(Grostl) and Contex Hull Research paperHash Function(Grostl) and Contex Hull Research paper
Hash Function(Grostl) and Contex Hull Research paper
SAIFUR RAHMAN
 
lecture13.pdf
lecture13.pdflecture13.pdf
lecture13.pdf
AlaaElhaddad3
 
unit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptographyunit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptography
NithyasriA2
 
A Modified approach for implementation of an efficient padding scheme in a di...
A Modified approach for implementation of an efficient padding scheme in a di...A Modified approach for implementation of an efficient padding scheme in a di...
A Modified approach for implementation of an efficient padding scheme in a di...
dannyijwest
 
Cryptography and network_security
Cryptography and network_securityCryptography and network_security
Cryptography and network_security
Janani Satheshkumar
 
Concepts of BlockChain explained very well
Concepts of BlockChain explained very wellConcepts of BlockChain explained very well
Concepts of BlockChain explained very well
panickerp23092
 
Cryptography and Network Security Principles and Practice.docx
Cryptography and Network Security Principles and Practice.docxCryptography and Network Security Principles and Practice.docx
Cryptography and Network Security Principles and Practice.docx
richardnorman90310
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Tony Nguyen
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
David Hoen
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Fraboni Ec
 
Hash& mac algorithms
Hash& mac algorithmsHash& mac algorithms
Hash& mac algorithms
Harry Potter
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
James Wong
 
Hash mac algorithms
Hash mac algorithmsHash mac algorithms
Hash mac algorithms
Young Alista
 
cryptography module-5 cyber securityantipatterns ,
cryptography module-5 cyber securityantipatterns ,cryptography module-5 cyber securityantipatterns ,
cryptography module-5 cyber securityantipatterns ,
shaziasulthana2
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
chauhankapil
 
NSC_Unit-III_final.ppt
NSC_Unit-III_final.pptNSC_Unit-III_final.ppt
NSC_Unit-III_final.ppt
DrVASAVIBANDE
 
Hash Function(Grostl) and Contex Hull Research paper
Hash Function(Grostl) and Contex Hull Research paperHash Function(Grostl) and Contex Hull Research paper
Hash Function(Grostl) and Contex Hull Research paper
SAIFUR RAHMAN
 
unit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptographyunit 4.pptx of hash function in cryptography
unit 4.pptx of hash function in cryptography
NithyasriA2
 

More from girilogu2 (11)

Decision tree algorithm in Machine Learning
Decision tree algorithm in Machine LearningDecision tree algorithm in Machine Learning
Decision tree algorithm in Machine Learning
girilogu2
 
Edge Detection using 4 bit MAC on Basys3 FPGA
Edge Detection using 4 bit MAC on Basys3 FPGAEdge Detection using 4 bit MAC on Basys3 FPGA
Edge Detection using 4 bit MAC on Basys3 FPGA
girilogu2
 
L11 Inner Product Space Applied Mathematics
L11 Inner Product Space Applied MathematicsL11 Inner Product Space Applied Mathematics
L11 Inner Product Space Applied Mathematics
girilogu2
 
L14 Projection and Gram Schmidt applied Mathematics
L14 Projection and Gram Schmidt applied MathematicsL14 Projection and Gram Schmidt applied Mathematics
L14 Projection and Gram Schmidt applied Mathematics
girilogu2
 
L15 Least square method in applied mathematics
L15 Least square method in applied mathematicsL15 Least square method in applied mathematics
L15 Least square method in applied mathematics
girilogu2
 
2.11 Diffie -hellman exchange.pptx
2.11 Diffie -hellman exchange.pptx2.11 Diffie -hellman exchange.pptx
2.11 Diffie -hellman exchange.pptx
girilogu2
 
2.2 Product-architecture.ppt
2.2 Product-architecture.ppt2.2 Product-architecture.ppt
2.2 Product-architecture.ppt
girilogu2
 
2.1 Product_Specifications.ppt
2.1 Product_Specifications.ppt2.1 Product_Specifications.ppt
2.1 Product_Specifications.ppt
girilogu2
 
VLSI Bluetooth baseband controller.pptx
VLSI Bluetooth baseband controller.pptxVLSI Bluetooth baseband controller.pptx
VLSI Bluetooth baseband controller.pptx
girilogu2
 
2.13 Inroductory idea of elliptic curve cryptography.pptx
2.13 Inroductory idea of elliptic curve cryptography.pptx2.13 Inroductory idea of elliptic curve cryptography.pptx
2.13 Inroductory idea of elliptic curve cryptography.pptx
girilogu2
 
2.10 Security of RSA.pptx
2.10 Security of RSA.pptx2.10 Security of RSA.pptx
2.10 Security of RSA.pptx
girilogu2
 
Decision tree algorithm in Machine Learning
Decision tree algorithm in Machine LearningDecision tree algorithm in Machine Learning
Decision tree algorithm in Machine Learning
girilogu2
 
Edge Detection using 4 bit MAC on Basys3 FPGA
Edge Detection using 4 bit MAC on Basys3 FPGAEdge Detection using 4 bit MAC on Basys3 FPGA
Edge Detection using 4 bit MAC on Basys3 FPGA
girilogu2
 
L11 Inner Product Space Applied Mathematics
L11 Inner Product Space Applied MathematicsL11 Inner Product Space Applied Mathematics
L11 Inner Product Space Applied Mathematics
girilogu2
 
L14 Projection and Gram Schmidt applied Mathematics
L14 Projection and Gram Schmidt applied MathematicsL14 Projection and Gram Schmidt applied Mathematics
L14 Projection and Gram Schmidt applied Mathematics
girilogu2
 
L15 Least square method in applied mathematics
L15 Least square method in applied mathematicsL15 Least square method in applied mathematics
L15 Least square method in applied mathematics
girilogu2
 
2.11 Diffie -hellman exchange.pptx
2.11 Diffie -hellman exchange.pptx2.11 Diffie -hellman exchange.pptx
2.11 Diffie -hellman exchange.pptx
girilogu2
 
2.2 Product-architecture.ppt
2.2 Product-architecture.ppt2.2 Product-architecture.ppt
2.2 Product-architecture.ppt
girilogu2
 
2.1 Product_Specifications.ppt
2.1 Product_Specifications.ppt2.1 Product_Specifications.ppt
2.1 Product_Specifications.ppt
girilogu2
 
VLSI Bluetooth baseband controller.pptx
VLSI Bluetooth baseband controller.pptxVLSI Bluetooth baseband controller.pptx
VLSI Bluetooth baseband controller.pptx
girilogu2
 
2.13 Inroductory idea of elliptic curve cryptography.pptx
2.13 Inroductory idea of elliptic curve cryptography.pptx2.13 Inroductory idea of elliptic curve cryptography.pptx
2.13 Inroductory idea of elliptic curve cryptography.pptx
girilogu2
 
2.10 Security of RSA.pptx
2.10 Security of RSA.pptx2.10 Security of RSA.pptx
2.10 Security of RSA.pptx
girilogu2
 
Ad

Recently uploaded (20)

Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control Monthly May 2025
Water Industry Process Automation & Control
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation RateModeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Journal of Soft Computing in Civil Engineering
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Prediction of Flexural Strength of Concrete Produced by Using Pozzolanic Mate...
Journal of Soft Computing in Civil Engineering
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Slide share PPT of NOx control technologies.pptx
Slide share PPT of  NOx control technologies.pptxSlide share PPT of  NOx control technologies.pptx
Slide share PPT of NOx control technologies.pptx
vvsasane
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
SICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introductionSICPA: Fabien Keller - background introduction
SICPA: Fabien Keller - background introduction
fabienklr
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
introduction technology technology tec.pptx
introduction technology technology tec.pptxintroduction technology technology tec.pptx
introduction technology technology tec.pptx
Iftikhar70
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
Ad

2.15 Message Authentication Code and Hash Functions.pptx

  • 1. SRI KRISHNA COLLEGE OF ENGINEERING AND TECHNOLOGY Kuniamuthur, Coimbatore, Tamilnadu, India An Autonomous Institution, Affiliated to Anna University, Accredited by NAAC with “A” Grade & Accredited by NBA (CSE, ECE, IT, MECH ,EEE, CIVIL& MCT) COURSE MATERIALMATERIAL Course : 20EC603 – Fundamentals of Network Security Module - 2: Public Key Cryptography and authentication requirements Topics : Message authentication code and Hash functions www.skcet.ac.in
  • 2. 2 Outline  Cryptographic Hash Functions  Applications  Simple hash functions  Requirements and security  Hash functions based on Cipher Block Chaining  Secure Hash Algorithm (SHA)
  • 3. 3 Hash Function  A hash function H accepts a variable-length block of data M as input and produces a fixed- size hash value h = H(M).  A “good” hash function has the property that the results of applying a change to any bit or bits in M results, with high probability, in a change to the hash code.
  • 4. 4 Input-Output behaviour of hash functions Alice was beginning to get very tired of sitting by her sister on the bank, and have nothing to do. I am not a crook I am not a cook H H H DFDC349A FB93E283 A3F4439B Message Message digest
  • 5. 5 Requirements for hash functions 1. Can be applied to any length of message M. 2. Produces fixed-length output h. 3. It is easy to compute h=H(M) for any message M. 4. Given hash value h is infeasible to find y such that (H(y) = h) • One-way property (In other words, given a fingerprint, we cannot derive a matching message). 5. For given block x, it is computationally infeasible to find y ≠ x with H(y) = H(x) • Weak collision resistance 6. It is computationally infeasible to find messages m1 and m2 with H(m1) = H(m2) • Strong collision resistance
  • 6. 6 Simple Hash Function  The input (message, file, etc.) is viewed as a sequence of n-bit blocks.  The input is processed one block at a time in an iterative fashion to produce an n-bit hash function.  One of the simplest hash functions is the bit-by-bit exclusive-OR (XOR) of every block. 𝑪𝒊 = 𝒃𝒊𝟏 ⊕ 𝒃𝒊𝟐 ⊕ … ⊕ 𝒃𝒊𝒎 Where, 𝐶𝑖 = ith bit of the hash code 1 ≤ i ≤ n m = number of n-bit blocks in the input 𝑏𝑖𝑗 = ith bit in jth block

Editor's Notes

  • #3: X.800 and RFC 2828 International Telecommunication Union (ITU)
  翻译: