Basic HTML version of Foils prepared May 30 99

Foil 10 Message Integrity with Secret Key Cryptography

From Basic Mathematics of Security Systems CPS714 Computational Science Information Track -- June 2 99. by Geoffrey C. Fox


1 Checksums are well known and a simple version can be gotten by dividing message into 32 bit groups and anding these groups together.
  • This is designed for fault tolerance and ensures that data was not garbled in transmission
2 Such checksums or hashes (designed properly) cannot be inverted and represent a unique fingerprint of original message.
3 A secret checksum combines this process with a secret key and produces a MIC (message integrity code) which can be decoded and checked
4 This can be used with either a ciphertext or plaintext message and guarantees that information is stored or transmitted faithfully
5 Note encrypting a message does not guarantee that it is not changed!
6 MIC with plaintext is used by bank electronic fund transfer

in Table To:


© Northeast Parallel Architectures Center, Syracuse University, npac@npac.syr.edu

If you have any comments about this server, send e-mail to webmaster@npac.syr.edu.

Page produced by wwwfoil on Sun May 30 1999