3 Message Authentication Codes

 

This chapter covers:

  • Message Authentication Codes (MAC), a cryptographic primitive to protect the integrity of data.
  • The security properties and the pitfalls of MACs.
  • The widely adopted standards for MACs.

pre-requesites:

  • Chapter 2 on Hash Functions.

In the previous Chapter 2, we’ve seen an interesting construction (a hash function) that on its own does not provide much, but if used in combination with a secure channel allows us to verify the authenticity and integrity of messages. In this chapter, we will see how one can provide integrity and authenticity over messages without the use of a secure channel.

3.1  What Is a Message Authentication Code?

 

3.2  Security Properties of a Message Authentication Code

 
 

3.3  MAC in the real world

 
 

3.4  Message Authentication Codes in Practice

 
 
 

3.4.1  HMAC, a Hash-Based Message Authentication Code

 
 
 
 

3.4.2  KMAC, a hash based on cSHAKE

 
 
 
 

3.5  Attack of the Chapter: SHA-2 and Length-Extension Attacks

 

3.6  Summary

 
 
 
sitemap

Unable to load book!

The book could not be loaded.

(try again in a couple of minutes)

manning.com homepage
test yourself with a liveTest