You are on page 1of 12

ARDHI UNIVERSITY

DEPARTMENT OF COMPUTER SYSTEMS AND MATHEMATICS


BSC.COMPUTER SYSTEMS AND NETWORKS (BCS. CSN) AND
BSC.INFORMATION SYSTEM(BSC.ISM)
IS251: INFORMATION SYSTEMS SECURITY
YEAR 2022/2023
ASSIGNMENT ONE.
S/N NAME REGISTRATION NUMBER
1 MOHAMEDI RAJABU KILINDI 27778/T.2021
2 TUNU USWEGE MWASANKEMWA 27798/T.2021
3 ANDREA DANIEL TUTU 27726/T.2021
4 GAVELINE SEATON GASTER 27746/T.2021
5 AGATHA S MKEN’GE 26928/T.2021
6 JOSHUA Y OZWARD 26973/T.2021
7 DOMAN E KWEKA 26947/T.2021
8 IRENE P SAMIKE 26964/T.2021
9 SEKUNDA J MKENDA 27010/T.2021
10 DAVID CHILONGOLA 26946/T.2021
SECURE ONE WAY HASH FUNCTION

• A secure one-way hash function is a cryptographic algorithm that takes an


input (or "message") of any size and produces a fixed-size string of
characters, known as the hash value or digest.
• cryptographic hash function is an algorithm for which it is computationally
infeasible to find either the one-way property or the collision-free property
• One of application of cryptographic hash function is Message
Authentication.
MESSAGE AUTHENTICATION CODES(MACs)

• Message Authentication Codes (MACs) are cryptographic constructs used


to verify the integrity and authenticity of a message.
• A MAC is a tag or a small piece of data generated from a combination of a
secret key and the message itself.
• The MAC serves as a unique identifier for the message and allows the
recipient to confirm that the message has not been tampered with during
transmission.
CRYPTOGRAPHIC ALGORITHMS.

MD4
MD5
SHA-1
SHA-2
MAC
KEYED-MAC
MD4(Message Digest Algorithm 4)

• Is algorithm that takes an input message of arbitrary length and produce an


output 128-bit “fingerprint” or message digest in such a way that it is
hopeful to produce two messages having the same message digest.
• It was developed by Ronald Rivest in 1990. It is no longer considered
secure due to vulnerabilities.
MD5(Message Digest Algorithm 5)

• Is hashing algorithm that accepts a message of any length as input and


gives output a fixed length digest value, is an extension of MD4 which the
critical review found to be fast and more assurance of data security.
• Its algorithm that process 512-bit strings, broken down into 16 words
contain 32-bit each giving 128-bit message digest value.
• developed by Ronald Rivest . However it is considered insecure due to
vulnerabilities and collisions.
SHA-1 (Secure Hash Algorithm 1)

• The most widely used hash function has been the Secure Hash Algorithm
(SHA). Indeed, because virtually every other widely used hash function
had been found to have substantial cryptanalytic weaknesses.

• SHA was developed by the National Institute of Standards and


Technology (NIST). SHA-1 is based on the hash function MD4, and its
design closely models MD4.
SHA-2 (Secure Hash Algorithm 2)

• SHA-2 is a family of cryptographic hash functions that includes various


hash output sizes, such as SHA-224, SHA-256, SHA-384, and SHA-512.
They produce hash values of different lengths (224, 256, 384, and 512
bits). SHA-2 is currently considered secure and widely used.
MAC (Message Authentication Code)

• MAC (Message Authentication Code): MAC is a cryptographic construct


used to verify the integrity and authenticity of a message. It is generated
using a secret key and the message. MACs can be based on various
algorithms, such as hash functions or block ciphers.
KEYED-MAC (Keyed Message Authentication
Code)

• Keyed-MAC (Keyed Message Authentication Code): Keyed-MAC is a


type of MAC that incorporates a secret key in addition to the message. The
secret key is shared between the sender and the recipient. Keyed-MAC
provides stronger security because an attacker needs both the message and
the secret key to generate a valid MAC.
CONCLUSION

• In conclusion, Message Authentication also can be done using Digital


Signature, is a mathematical scheme that is used to verify the authenticity
and integrity of a message.
• It involves the use of private key which is known by the sender and public
key that is known by both sender and receiver. The hash value of a
message is encrypted with a user’s private key.
• Anyone who knows the user’s public key can verify the integrity of the
message that is associated with the digital signature. And message
authentication is more important in information security and used in
variety applications such as e-commerce and online banking.
REFERRENCE

• Stallings, W. (2011). Cryptography and network security, principles and practice. United States
of America: Pearson Education, Inc.

• Shacklett, M. E. (n.d.). TechTarget. Retrieved from Network Security:


https://www.techtarget.com

You might also like