MAC introduction

What is MAC?
MAC is a service which is used for the authentication of message, checks the integrity of message. MAC uses a secret key for the purpose of encryption. It takes the key and the message as input and produces the authentication code as the input.
Requirements of MAC
• Disclosure
• Traffic analysis
• Masquerade
• Content modification
• Sequence modification
• Timing modification
• Source repudiation
• Destination repudiation
Disclosure
It describes about the process of release of contents of the message to the person who is not having the appropriate cryptographic key.
Traffic analysis
It determines the patterns of traffic among the parties who are in the connection oriented network. It can be determined also in the connection less network.
Masquerade
In this the attacker may indulge the unwanted message contents in in the network. This may lead to the fraudulence in the communication channel.
Content modification
It leads to the modification of messages in the communication channel which are sent to receiver from sender.
Sequence modification
It involves the process of modifying the sequence of messages.
Timing modification
It describes the replay or delay of messages which are sent from sender to receiver.
Source repudiation
It describes the process of denial of services from the sender side
Destination repudiation
It describes the process of denial of services from the receiver side.
 
MAC provides the service in the following different ways.

This service is used in the context of symmetric encryption and provides confidentiality and the authentication.

 

 

This service is used in the context of public key encryption and provides confidentiality.

 

 

This service is used in the context of symmetric encryption and provides authentication and the signature.

 

 

This service is used in the context of symmetric encryption and provides authentication the signature and confidentiality.

Conclusion:

MAC can also be combined with hash to provide the different feature; the algorithm which is developed by them is HMAC. MAC is also combined with the block cipher in order to develop the DAA, CMAC like algorithms. In fact HASH and MAC are combinedly used to generate pseudo random generators.

Contributor's Info

Created:
0Comment