Professional Documents
Culture Documents
AUTHENTICATION &
HASH FUNCTION
By:
NISHU RASTOGI
AUTHENTICATION
REQUIREMENT
During communication following attacks may be identified:
Disclosure
Traffic Analysis
Masquerade
Content Modification
Sequence Modification
Timing Modification (replay attack)
Source Repudiation
Destination Repudiation
NISHU RASTOGI, ASSISTANT PROFESSOR, INVERTIS UNIVERSITY, BAREILLY 10/08/2023 2
AUTHENTICATION FUNCTIONS
The receiver is assured that the message has been not altered.
The receiver is assured that the message is from authenticated sender.
The receiver is assured that integrity is maintained.
MAC function is similar to encryption, but MAC algorithm is not
required to be reversible.