Professional Documents
Culture Documents
L-2.5 Authentication Requirements
L-2.5 Authentication Requirements
Authentication Requirements
Authentication Requirements
Message authentication
Message authentication is a procedure to verify that
received messages come from the suspected source
and have not been altered. Message authentication
may also verify sequencing and timeliness.
A digital signature is an authentication technique that
also includes measures to counter repudiation by
either source or destination.
Hash Functions
Hash Functions…….
A cryptographic hash function is an algorithm for which it is
computationally infeasible to find either
Two data objects that map to the same hash result (The
collision-free property).
Message Authentication
When confidentiality is not required, method (b) takes less computation time
as compared to methods (a) and (d).
Digital Signatures
Anyone who knows the user’s public key can verify the
integrity of the message that is associated with the digital
signature.
Other Applications
References
• http://www.brainkart.com/article/Classical-Encryption-
Techniques_8339/
• https://www.tutorialspoint.com/cryptography/index.ht
m
• https://www.geeksforgeeks.org/cryptography-introducti
on/
• https://www.techopedia.com/definition/1770/cryptogr
aphy#:~:text=Cryptography%20involves%20creating%2
0written%20or,information%20to%20be%20kept%20s
ecret.&text=Information%20security%20uses%20crypto
graphy%20on,transit%20and%20while%20being%20st
ored
.
• https://www2.slideshare.net/lineking/classical-encrypti
University Institute of Engineering (UIE)
Department of Computer Science and Engineering (CSE)
E- Books Recommended
• https://www.pdfdrive.com/cyber-security-books.html
• https://bookauthority.org/books/new-cyber-security-eb
ooks
• https://bookauthority.org/books/best-cyber-security-eb
ooks
• https://www.freetechbooks.com/information-security-f5
2.html