Integrity and Authentication

Beschreibung

Mindmap am Integrity and Authentication, erstellt von Davide Cometa am 14/11/2017.
Davide Cometa
Mindmap von Davide Cometa, aktualisiert more than 1 year ago
Davide Cometa
Erstellt von Davide Cometa vor etwa 7 Jahre
8
0

Zusammenfassung der Ressource

Integrity and Authentication

Anmerkungen:

  • The ability to guarantey that a given message has not been modified from its original content.
  1. Manual

    Anmerkungen:

    • Choose randomly pieces of message and compare. There is no 100% assurance and comparing all pieces would take too long.
    1. CRC - Cyclic Redundancy Check

      Anmerkungen:

      • not suitable for security: they expect that unpredictable events damage single equioprobable bits randomly.
      1. Digest

        Anmerkungen:

        • Computed summaries are compared 
        1. Cryptographic Hash

          Anmerkungen:

          • Uses Hash Functions to provide: - performance - one-way (not invertible) - collision free -> impossible to achieve completely; alisiang probability is 1/(2^Nbit).
          1. MD2
            1. MD4
              1. MD5
                1. SHA-1
                  1. SHA-2
                    1. SHA-3
                      1. RIPEMD
                      2. Authentication
                        1. Protected Digest
                          1. MAC - Message Authentication Code

                            Anmerkungen:

                            • it can support also a MID (Message IDentifier) to avoid replay attacks. Must always be associated to a MAC to avoid changes to data.  Consider that this has not the purpose of guaranteing confidentiality!
                            1. is done by Cryptography

                              Anlagen:

                              1. based on Symmetric Cryptography

                                Anmerkungen:

                                • The authentication is based on the use of a symmetric key. Only who knows the key can modify the MAC. Being based on a shared key it is not possible to provide non-repudiation.
                                1. Authentication by means of symmetric encryption of the message
                                  1. Authentication by means of symmetric encryption of the message digest
                                    1. Authentication by keyed-digest
                                    2. based on Asymmetric Cryptography
                                      1. Authentication by means of digital signature
                                    3. To provide both confidentiality and authentication (+ integrity) combine cryptography of data with symmetric alg and use MAC
                                      1. Different combinations of authentication and encryption exists
                                        1. Authenticate-And-Encrypt
                                          1. Authenticate-Then-Encrypt
                                            1. Encrypt-Then-Authenticate
                                              1. Authenticated Encryption
                                                1. AEAD
                                                  1. IGE
                                            2. MIC - Message Integrity Code
                                        Zusammenfassung anzeigen Zusammenfassung ausblenden

                                        ähnlicher Inhalt

                                        A-Z E-Learning Trends die du kennen solltest
                                        AntonS
                                        La politique - Vocabulaire
                                        Gaelle Bourgeois
                                        SMART Lernziele
                                        barbara91
                                        Öff.Recht - Streite Staatsorganisationsrecht
                                        myJurazone
                                        Klinische Psychologie-Grundlagen
                                        evasophie
                                        KFOR Univie (mögliche Prüfungsfragen)
                                        frau planlos
                                        GESKO A JOUR WS18/19
                                        anna Meyer
                                        Basiswissen_MS-4.2_Foliensatz I_Stand_03.11.19
                                        Bernd Leisen
                                        Orthopädie Pferd Bildgebung Vetie
                                        Fenja Joseph
                                        Vetie - Fleisch 2016
                                        Kim Langner
                                        Vetie: Geflügelkrankheiten 2020 (Matrikel 2015)
                                        Ro F