Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
LaRon Walker - Message Authentication Code

LaRon Walker - Message Authentication Code

|Views: 53|Likes:
Published by LaRon Walker
Message Authentication Code
Message Authentication Code

More info:

Published by: LaRon Walker on Apr 05, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less





Message Authentication CodeLaRon WalkerMaster of Information Technology and Internet SecurityMay, 2010
The amount of information being passed over public and private networks has causedmajor concerns when it comes to privacy and information security. There are many componentsthat should be considered when developing a strategy to address these concerns. Messageauthentication is one of these components.Message authentication is a method used to verify messages are securely passed betweensender and recipient without being altered by external sources. When using the messageauthentication technique, there are two levels of authentication. These levels are the lower levelauthentication, which verifies the integrity of the sender of the message, and the higher levelauthentication, which verifies the integrity of the message itself (Stallings, 2006). Despitemessage authentication as being a commonly used practice, it still is vulnerable to attacks.Due to the way information is transferred over public and private networks, this data issusceptible to being intercepted or altered by an outside source. Attacks that are commonlyperformed on networks to gain unauthorized access to this information are as follows:1.
Traffic analysis3.
Content modification
Sequence modification6.
Timing modification7.
Source repudiation8.
Destination repudiation (Stallings, 2006).The above attacks are all requirements that must addressed to have an affective messageauthentication strategy. Also, to address these issues, you must consider both lower and highlevel authentication tactics.There are three main classes of techniques that can be used to encrypt messages on thislower level. These methods are by using hash functions, message encryption, and messageauthentication codes (Stallings, 2006). Using any of these techniques cover most of the aboveattack concerns. Using digital signature in conjunction with any of these lower levelauthentication techniques can help address the higher level authentication security concerns.Along with this, newer, more secure lower level practices are being developed to help addressthe exploits being discovered daily. One of these new cryptology practices is called abstractcryptology. Using this strategy, an outsider is able to obtain cryptology information and createsattacks using cryptology primitives, the attacks would not work as they would when not usingthis method (Mashatan, 2009).
Mashatan, A., & Stinson, D.. (2009). Interactive two-channel message authentication based onInteractive-Collision Resistant hash functions. International Journal of InformationSecurity, 8(1), 49-60. Retrieved May 23, 2010, from ABI/INFORM Global. (DocumentID: 1631

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->