26.01.2014 Views

MODERN CRYPTOGRAPHY

MODERN CRYPTOGRAPHY

MODERN CRYPTOGRAPHY

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

User Authentication and Data Integrity<br />

using Symmetric Cryptography<br />

Can only take place between two parties who are prepared to cooperate<br />

with each other<br />

Typical authentication scheme:<br />

A and B share a secret key K which (they believe) is known<br />

only to them<br />

A sends a ‘challenge’ to B. If the response is the challenge<br />

encrypted with key K then A believes the response is from B<br />

Data Integrity:<br />

If A sends a message to B with a cryptographic checksum using<br />

K then B uses K to check the checksum and, if it is correct, knows<br />

the message is unaltered and came from A<br />

Note: A and B need to protect against replays etc<br />

IMA 2009 31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!