Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Message authentication code

From Wikipedia, the free encyclopedia
Information used for message authentication and integrity checking

Incryptography, amessage authentication code (MAC), sometimes known as anauthentication tag, is a short piece of information used forauthenticating andintegrity-checking a message. In other words, it is used to confirm that the message came from the stated sender (its authenticity) and has not been changed (its integrity). The MAC value allows verifiers (who also possess a secret key) to detect any changes to the message content.

Terminology

[edit]

The termmessage integrity code (MIC) is frequently substituted for the termMAC, especially in communications[1] to distinguish it from the use of the latter asMedia Access Control address (MAC address). However, some authors[2] use MIC to refer to amessage digest, which aims only to uniquely but opaquely identify a single message. However, it is recommended to avoid the termmessage integrity code (MIC), and instead usechecksum,error detection code,hash,keyed hash,message authentication code, orprotected checksum.[3]

Definitions

[edit]

Informally, a message authentication code system consists of three algorithms:

  • Akey generation algorithm selects a key from the key space uniformly at random.
  • A MAC generation algorithm efficiently returns a tag given the key and the message.
  • A verifying algorithm efficiently verifies the authenticity of the message given the same key and the tag. That is, returnaccepted when the message and tag are not tampered with or forged, and otherwise returnrejected.

A secure message authentication code must resist attempts by an adversary toforge tags, for arbitrary, selected, or all messages, including under conditions ofknown- orchosen-message. It should be computationally infeasible to compute a valid tag of the given message without knowledge of the key, even if for the worst case, we assume the adversary knows the tag of any message but the one in question.[4]

Formally, amessage authentication code (MAC) system is a triple of efficient[5] algorithms (G,S,V) satisfying:

  • G (key-generator) gives the keyk on input1n, wheren is thesecurity parameter.
  • S (signing) outputs a tagt on the keyk and the input stringx.
  • V (verifying) outputsaccepted orrejected on inputs: the keyk, the stringx and the tagt.

S andV must satisfy the following:

Pr [kG(1n),V(k,x,S(k,x) ) =accepted ] = 1.[6]

A MAC isunforgeable if for every efficient adversaryA

Pr [kG(1n), (x,t) ←AS(k, · )(1n),x ∉ Query(AS(k, · ), 1n),V(k,x,t) =accepted] < negl(n),

whereAS(k, · ) denotes thatA has access to the oracleS(k, · ), and Query(AS(k, · ), 1n) denotes the set of the queries onS made byA, which knowsn. Clearly we require that any adversary cannot directly query the stringx onS, since otherwise a valid tag can be easily obtained by that adversary.[7]

Security

[edit]

While MAC functions are similar tocryptographic hash functions, they possess different security requirements. To be considered secure, a MAC function must resistexistential forgery underchosen-message attacks. This means that even if an attacker has access to anoracle which possesses the secret key and generates MACs for messages of the attacker's choosing, the attacker cannot guess the MAC for other messages (which were not used to query the oracle) without performing infeasible amounts of computation.

MACs differ fromdigital signatures as MAC values are both generated and verified using the same secret key. This implies that the sender and receiver of a message must agree on the same key before initiating communications, as is the case withsymmetric encryption. For the same reason, MACs do not provide the property ofnon-repudiation offered by signatures specifically in the case of a network-wideshared secret key: any user who can verify a MAC is also capable of generating MACs for other messages. In contrast, a digital signature is generated using the private key of a key pair, which is public-key cryptography.[5] Since this private key is only accessible to its holder, a digital signature proves that a document was signed by none other than that holder. Thus, digital signatures do offer non-repudiation. However, non-repudiation can be provided by systems that securely bind key usage information to the MAC key; the same key is in the possession of two people, but one has a copy of the key that can be used for MAC generation while the other has a copy of the key in ahardware security module that only permits MAC verification. This is commonly done in the finance industry.[citation needed]

See also:Key commitment

While the primary goal of a MAC is to prevent forgery by adversaries without knowledge of the secret key, this is insufficient in certain scenarios. When an adversary is able to control the MAC key, stronger guarantees are needed, akin tocollision resistance orpreimage security in hash functions. For MACs, these concepts are known ascommitment andcontext-discovery security.[8]

Implementation

[edit]

MAC algorithms can be constructed from other cryptographic primitives, likecryptographic hash functions (as in the case ofHMAC) or fromblock cipher algorithms (OMAC,CCM,GCM, andPMAC). However many of the fastest MAC algorithms, likeUMAC-VMAC andPoly1305-AES, are constructed based onuniversal hashing.[9]

Intrinsically keyed hash algorithms such asSipHash are also by definition MACs; they can be even faster than universal-hashing based MACs.[10]

Additionally, the MAC algorithm can deliberately combine two or more cryptographic primitives, so as to maintain protection even if one of them is later found to be vulnerable. For instance, inTransport Layer Security (TLS) versions before 1.2, theinput data is split in halves that are each processed with a different hashing primitive (SHA-1 andSHA-2) thenXORed together to output the MAC.

One-time MAC

[edit]

Universal hashing and in particularpairwise independent hash functions provide a secure message authentication code as long as the key is used at most once. This can be seen as theone-time pad for authentication.[11]

The simplest such pairwise independent hash function is defined by the random key,key = (a,b), and the MAC tag for a messagem is computed astag = (am +b) modp, wherep is prime.

More generally,k-independent hashing functions provide a secure message authentication code as long as the key is used less thank times fork-ways independent hashing functions.

Message authentication codes and data origin authentication have been also discussed in the framework ofquantum cryptography. By contrast to other cryptographic tasks, such as key distribution, for a rather broad class of quantum MACs it has been shown that quantum resources do not offer any advantage over unconditionally secure one-time classical MACs.[12]

Standards

[edit]

Various standards exist that define MAC algorithms. These include:

  • FIPS PUB 113Computer Data Authentication,[13] withdrawn in 2002,[14] defines an algorithm based onDES.
  • FIPS PUB 198-1The Keyed-Hash Message Authentication Code (HMAC)[15]
  • NIST SP800-185SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash, and ParallelHash[16]
  • ISO/IEC 9797-1Mechanisms using a block cipher[17]
  • ISO/IEC 9797-2Mechanisms using a dedicated hash-function[18]
  • ISO/IEC 9797-3Mechanisms using a universal hash-function[19]
  • ISO/IEC 29192-6Lightweight cryptography - Message authentication codes[20]

ISO/IEC 9797-1 and -2 define generic models and algorithms that can be used with any block cipher or hash function, and a variety of different parameters. These models and parameters allow more specific algorithms to be defined by nominating the parameters. For example, the FIPS PUB 113 algorithm is functionally equivalent to ISO/IEC 9797-1 MAC algorithm 1 with padding method 1 and a block cipher algorithm of DES.

An example of MAC use

[edit]

[21] In this example, the sender of a message runs it through a MAC algorithm to produce a MAC data tag. The message and the MAC tag are then sent to the receiver. The receiver in turn runs the message portion of the transmission through the same MAC algorithm using the same key, producing a second MAC data tag. The receiver then compares the first MAC tag received in the transmission to the second generated MAC tag. If they are identical, the receiver can safely assume that the message was not altered or tampered with during transmission (data integrity).

However, to allow the receiver to be able to detectreplay attacks, the message itself must contain data that assures that this same message can only be sent once (e.g. time stamp,sequence number or use of aone-time MAC). Otherwise an attacker could – without even understanding its content – record this message and play it back at a later time, producing the same result as the original sender.

See also

[edit]

Notes

[edit]
  1. ^IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications(PDF). (2007 revision).IEEE-SA. 12 June 2007.doi:10.1109/IEEESTD.2007.373646.ISBN 978-0-7381-5656-9. Archived fromthe original(PDF) on 13 October 2008.
  2. ^"CS 513 System Security -- Hashes and Message Digests".www.cs.cornell.edu. Retrieved20 December 2023.
  3. ^R. Shirey (August 2007).Internet Security Glossary, Version 2. Network Working Group.doi:10.17487/RFC4949.RFC4949.Informational. ObsoletesRFC 2828.
  4. ^The strongest adversary is assumed to have access to the signing algorithm without knowing the key. However, her final forged message must be different from any message she chose to query the signing algorithm before. See Pass's discussions before def 134.2.
  5. ^abTheoretically, an efficient algorithm runs within probabilistic polynomial time.
  6. ^Pass, def 134.1
  7. ^Pass, def 134.2
  8. ^Bhaumik, Ritam; Chakraborty, Bishwajit; Choi, Wonseok; Dutta, Avijit; Govinden, Jérôme; Shen, Yaobin (2024)."The Committing Security of MACs with Applications to Generic Composition". In Reyzin, Leonid; Stebila, Douglas (eds.).Advances in Cryptology – CRYPTO 2024. Lecture Notes in Computer Science. Vol. 14923. Cham: Springer Nature Switzerland. pp. 425–462.doi:10.1007/978-3-031-68385-5_14.ISBN 978-3-031-68385-5.
  9. ^"VMAC: Message Authentication Code using Universal Hashing".CFRG Working Group. Retrieved16 March 2010.
  10. ^Jean-Philippe Aumasson &Daniel J. Bernstein (18 September 2012)."SipHash: a fast short-input PRF"(PDF).
  11. ^Simmons, Gustavus (1985). "Authentication theory/coding theory".Advances in Cryptology – Proceedings of CRYPTO 84. Berlin: Springer. pp. 411–431.
  12. ^Nikolopoulos, Georgios M.; Fischlin, Marc (2020)."Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources".Cryptography.4 (4): 31.arXiv:2011.06849.doi:10.3390/cryptography4040031.S2CID 226956062.
  13. ^"FIPS PUB 113Computer Data Authentication". Archived fromthe original on 27 September 2011. Retrieved10 October 2010.
  14. ^"Federal Information Processing Standards Publications, Withdrawn FIPS Listed by Number". Archived fromthe original on 1 August 2010. Retrieved10 October 2010.
  15. ^"The Keyed-Hash Message Authentication Code (HMAC)"(PDF). Retrieved20 December 2023.
  16. ^SHA-3 Derived Functions nvlpubs.nist.gov
  17. ^"ISO/IEC 9797-1:2011".ISO. Retrieved20 December 2023.
  18. ^"ISO/IEC 9797-2:2011".ISO. Retrieved20 December 2023.
  19. ^"ISO/IEC 9797-3:2011".ISO. Retrieved20 December 2023.
  20. ^"ISO/IEC 29192-6:2019".ISO. Retrieved20 December 2023.
  21. ^"Mac Security Overview",Mac® Security Bible, Wiley Publishing, Inc., 1 November 2011, pp. 1–26,doi:10.1002/9781118257739.ch1,ISBN 9781118257739

References

[edit]
  • Goldreich, Oded (2001),Foundations of cryptography I: Basic Tools, Cambridge: Cambridge University Press,ISBN 978-0-511-54689-1
  • Goldreich, Oded (2004),Foundations of cryptography II: Basic Applications (1. publ. ed.), Cambridge [u.a.]: Cambridge Univ. Press,ISBN 978-0-521-83084-3
  • Pass, Rafael,A Course in Cryptography(PDF), retrieved31 December 2015[1]

External links

[edit]
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics
Authority control databasesEdit this at Wikidata
  1. ^11-12-20C8
Retrieved from "https://en.wikipedia.org/w/index.php?title=Message_authentication_code&oldid=1314530160"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp