Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Message authentication

From Wikipedia, the free encyclopedia
System to verify the source and or authenticity of a message
icon
This article'slead sectionmay be too short to adequatelysummarize the key points. Please consider expanding the lead toprovide an accessible overview of all important aspects of the article. The reason given is:it misses a summary of the content of each section(June 2024)

Ininformation security,message authentication ordata origin authentication is a property that a message has not been modified while in transit (data integrity) and that the receiving party can verify the source of the message.[1]

Description

[edit]

Message authentication or data origin authentication is aninformation security property that indicates that a message has not been modified while in transit (data integrity) and that the receiving party can verify the source of the message.[1] Messageauthentication does not necessarily include the property ofnon-repudiation.[2][3]

Techniques

[edit]

Message authentication is typically achieved by usingmessage authentication codes (MACs),authenticated encryption (AE), ordigital signatures.[2] The message authentication code, also known as digital authenticator, is used as an integrity check based on a secret key shared by two parties to authenticate information transmitted between them.[4] It is based on using acryptographic hash orsymmetric encryption algorithm.[5] The authentication key is only shared by exactly two parties (e.g. communicating devices), and the authentication will fail in the existence of a third party possessing the key since thealgorithm will no longer be able to detectforgeries (i.e. to be able to validate the unique source of the message).[6] In addition, the key must also be randomly generated to avoid its recovery through brute-force searches and related-key attacks designed to identify it from the messages transiting the medium.[6]

Some cryptographers distinguish between "message authentication without secrecy" systems – which allow the intended receiver to verify the source of the message, but they don't bother hiding the plaintext contents of the message – fromauthenticated encryption systems.[7] Some cryptographers have researchedsubliminal channel systems that send messages that appear to use a "message authentication without secrecy" system, but in fact also transmit a secret message.

Related concepts

[edit]

Data origin authentication and non-repudiation have been also studied in the framework of quantum cryptography.[8][9]

See also

[edit]

References

[edit]
  1. ^abMihir Bellare."Chapter 7: Message Authentication"(PDF).CSE 207: Modern Cryptography. Lecture notes for cryptography course. Archived fromthe original(PDF) on 2018-10-09. Retrieved2015-05-11.
  2. ^abAlfred J. Menezes;Paul C. van Oorschot;Scott A. Vanstone."Chapter 9 - Hash Functions and Data Integrity"(PDF).Handbook of Applied Cryptography. p. 361.Archived from the original on 2021-02-03. Retrieved2015-05-11.
  3. ^"Data Origin Authentication".Web Service Security.Microsoft Developer Network. 14 July 2010.Archived from the original on 19 May 2017. Retrieved11 May 2015.
  4. ^Patel, Dhiren (2008).Information Security: Theory and Practice. New Delhi: Prentice Hall India Private Lt. p. 124.ISBN 978-81-203-3351-2.
  5. ^Jacobs, Stuart (2011).Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance. Hoboken, NJ: John Wiley & sons. p. 108.ISBN 978-0-470-56512-4.
  6. ^abWalker, Jesse (2013). "Chapter 13 – Internet Security". In Vacca, John R. (ed.).Computer and Information Security Handbook (3rd ed.). Morgan Kaufmann Publishers. pp. 256–257.doi:10.1016/B978-0-12-803843-7.00013-2.ISBN 978-0-12-803843-7.
  7. ^Longo, G.; Marchi, M.; Sgarro, A. (4 May 2014).Geometries, Codes and Cryptography. Springer. p. 188.ISBN 978-3-7091-2838-1.Archived from the original on 9 January 2024. Retrieved8 July 2015.
  8. ^Pirandola, S.; Andersen, U. L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; Pereira, J. (2020). "Advances in Quantum Cryptography".Advances in Optics and Photonics.12 (4):1012–1236.arXiv:1906.01645.Bibcode:2020AdOP...12.1012P.doi:10.1364/AOP.361502.S2CID 174799187.
  9. ^Nikolopoulos, Georgios M.; Fischlin, Marc (2020)."Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources".Cryptography.4 (4): 31.arXiv:2011.06849.doi:10.3390/cryptography4040031.S2CID 226956062.
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Message_authentication&oldid=1299802689"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp