I often get this question from students: "What's the difference between MAC, Hashes, and Digital Signatures?" So I thought I'd write a short article about it. For more about these topics, get my CompTIA Security+ Cert Guide today!
First let's give a short description of each:
- Cryptographic hash functions: This is a procedure that calculates
a fixed-size bit string (hash value) from a piece of data. If the data
is changed while it is in storage or in transit, the hash value will
also be changed. This allows a person to verify whether the data has
been tampered with. often, the data will be called the "message",
and the hash value will be called the "message digest" or
8FD8 6CD1 CBE2 18DE AEFE
When a file is downloaded from a website, the file can be checked against the hash (for example an MD5 or SHA-1 hash) that is often listed next to the file download link. If the original hash and the downloaded file's hash are the same, you can be fairly sure the data hasn't been tampered with. If they are not the same, the downloaded file should be discarded as it has probably been compromised. Cryptographic hash functions can be used in conjunction with digital signatures and MACs as well.
- Digital Signatures: These are mathematical processes for proving the authenticity of a document or message. A proper digital signature implies that the message or document was created by the actual sender and not someone else. They are commonly used to prove that an electronic signature (a person's actual signature performed on the computer) is authentic. They use asymmetric cryptography.
- MAC (Message authentication code): This is a small piece of information used to authenticate a message. The MAC algorithm takes a message and secret key and outputs a MAC value or "tag". MACs only use secret keys, and rely on symmetric encryption. However, to function as intended the MAC must be able to resist plaintext attacks even if a hacker knows the secret key. Although the hacker can create their own MACs from the key, the MAC algorithm must be strong enough to make it impossible for the hacker to calculate the MAC for other messages. MACs can be built from hash functions; these are known as keyed hash functions.
Now, let's cite some of the differences between the three:
- A MAC can be a cryptographic hash function (as in keyed hash functions), but a cryptographic hash function is not always a MAC.
- Digital signatures can be used in conjunction with cryptographic hash functions (as in SHA-1 and the Digital Signature Algorithm), but a cryptographic hash function is not always a digital signature.
- Digital signatures utilize asymmetric cryptography, whereas MACs use symmetric cryptography.
- Digital signatures provide for non-repudiation, whereas MACs do not, and cryptographic hash functions usually do not.
- MACs require additional security requirements than cryptographic hash functions, for example, the MAC must be resistant to plaintext attacks.
Hope this helps some of you!
|About Dave||Testimonials||FAQ||Site Map||Contact|
Copyright © David L. Prowse – Official Website - All Rights Reserved