




版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法1Cryptography and Network Security(Various Hash Algorithms)Fourth Editionby William StallingsLecture slides by Lawrie Brown(Changed by Somesh Jha)CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法2Birthday Attacks mi
2、ght think a 64-bit hash is secure but by Birthday Paradox is not birthday attack works thus: opponent generates 2m/2 variations of a valid message all with essentially the same meaning opponent also generates 2m/2 variations of a desired fraudulent message two sets of messages are compared to find p
3、air with same hash (probability 0.5 by birthday paradox) have user sign the valid message, then substitute the forgery which will have a valid signature conclusion is that need to use larger MACsCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法3Hash Function Properties a Hash Funct
4、ion produces a fingerprint of some h = H(M) condenses a variable-length message M to a fixed-sized fingerprint assumed to be publicCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法4Requirements for Hash Functionscan be applied to any sized message Mproduces fixed-length output his
5、easy to compute h=H(M) for any message Mgiven h is infeasible to find x s.t. H(x)=hone-way propertygiven x is infeasible to find y s.t. H(y)=H(x)weak collision resistanceis infeasible to find any x,y s.t. H(y)=H(x)strong collision resistanceCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全
6、(不同的散列算法5Block Ciphers as Hash Functions can use block ciphers as hash functions using H0=0 and zero-pad of final block compute: Hi = EMi Hi-1 and use final block as the hash value similar to CBC but without a key resulting hash is too small (64-bit) both due to direct birthday attack and to “meet-i
7、n-the-middle” attack other variants also susceptible to attackCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法6Hash Algorithms similarities in the evolution of hash functions & block ciphers increasing power of brute-force attacks leading to evolution in algorithms from DES to
8、 AES in block ciphers from MD4 & MD5 to SHA-1 & RIPEMD-160 in hash algorithms likewise tend to use common iterative structure as do block ciphersCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法7MD5 designed by Ronald Rivest (the “R” in RSA) latest in a series of MD2, MD4 p
9、roduces a 128-bit hash value until recently was the most widely used hash algorithm in recent times have both brute-force & cryptanalytic concerns specified as Internet standard RFC1321CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法8MD5 Overviewpad message so its length is 44
10、8 mod 512 append a 64-bit length value to message initialise 4-word (128-bit) MD buffer (A,B,C,D) process message in 16-word (512-bit) blocks: using 4 rounds of 16 bit operations on message block & buffer add output to buffer input to form new buffer value output hash value is the final buffer v
11、alue CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法9MD5 OverviewCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法10MD5 Compression Function each round has 16 steps of the form: a = b+(a+g(b,c,d)+Xk+Ti)s) a,b,c,d refer to the 4 words of the buffer, but used in v
12、arying permutations note this updates 1 word only of the buffer after 16 steps each word is updated 4 times where g(b,c,d) is a different nonlinear function in each round (F,G,H,I) Ti is a constant value derived from sinCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法11MD5 Compres
13、sion FunctionCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法12MD4 precursor to MD5 also produces a 128-bit hash of message has 3 rounds of 16 steps versus 4 in MD5 design goals: collision resistant (hard to find collisions) direct security (no dependence on hard problems) fast, s
14、imple, compact favors little-endian systems (eg PCs) CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法13Strength of MD5 MD5 hash is dependent on all message bits Rivest claims security is good as can be known attacks are: Berson 92 attacked any 1 round using differential cryptanaly
15、sis (but cant extend) Boer & Bosselaers 93 found a pseudo collision (again unable to extend) Dobbertin 96 created collisions on MD compression function (but initial constants prevent exploit) conclusion is that MD5 looks vulnerable soonCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(
16、不同的散列算法14Secure HashAlgorithm (SHA-1) SHA was designed by NIST & NSA in 1993, revised 1995 as SHA-1 US standard for use with DSA signature scheme standard is FIPS 180-1 1995, also Internet RFC3174 note: the algorithm is SHA, the standard is SHS produces 160-bit hash values now the generally pref
17、erred hash algorithm based on design of MD4 with key differences CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法15SHA Overviewpad message so its length is 448 mod 512 append a 64-bit length value to messageinitialise 5-word (160-bit) buffer (A,B,C,D,E) to (67452301,efcdab89,98bad
18、cfe,10325476,c3d2e1f0) process message in 16-word (512-bit) chunks:expand 16 words into 80 words by mixing & shifting use 4 rounds of 20 bit operations on message block & buffer add output to input to form new buffer value output hash value is the final buffer value CryptographyandNetworkSec
19、urity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法16SHA-1 Compression Function each round has 20 steps which replaces the 5 buffer words thus:(A,B,C,D,E) -(E+f(t,B,C,D)+(A5)+Wt+Kt),A,(B30),C,D) a,b,c,d,e refer to the 5 words of the buffer t is the step number f(t,B,C,D) is nonlinear function for round Wt is
20、 derived from the message block Kt is a constant value derived from sinCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法17SHA-1 Compression FunctionCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法18SHA-1 verses MD5 brute force attack is harder (160 vs 128 bits fo
21、r MD5) not vulnerable to any known attacks (compared to MD4/5) a little slower than MD5 (80 vs 64 steps) both designed as simple and compact optimised for big endian CPUs (vs MD5 which is optimised for little endian CPUs) CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法19Revised S
22、ecure Hash Standard NIST has issued a revision FIPS 180-2 adds 3 additional hash algorithms SHA-256, SHA-384, SHA-512 designed for compatibility with increased security provided by the AES cipher structure & detail is similar to SHA-1 hence analysis should be similarCryptographyandNetworkSecurit
23、y(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法20Keyed Hash Functions as MACs have desire to create a MAC using a hash function rather than a block cipher because hash functions are generally faster not limited by export controls unlike block ciphers hash includes a key along with the message original propos
24、al:KeyedHash = Hash(Key|Message) some weaknesses were found with this eventually led to development of HMAC CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學與網絡安全(不同的散列算法21HMAC specified as Internet standard RFC2104 uses hash function on the message:HMACK = Hash(K+ XOR opad) | Hash(K+ XOR ipad)|M) where K+ is the key padded out to size and opad, ipad are specified padding constants overhead is just 3 mor
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 醫院康復護理培訓課件:《洼田飲水試驗》
- 青海省果洛藏族自治州本年度(2025)小學一年級數學部編版綜合練習((上下)學期)試卷及答案
- 2025-2030年中國數控火花割機行業運行態勢及發展趨勢研究報告
- 2025-2030年中國教育電子產品資金申請報告
- 湖北省鋼城第四中學2025年高三最后一卷英語試卷含解析
- 四川省綿陽市梓潼中學2025屆高三下第一次測試英語試題含解析
- VR技術應用測試題+答案
- OFFICE題庫(附參考答案)
- 安徽省宿州市省、市示范高中2024一2025學年高二下學期期中教學質量檢測生物試題(原卷版+解析版)
- 紙容器生產過程中的廢氣處理技術考核試卷
- 農村常用法律法規知識講座課件(村干部培訓)
- 生活中的法律-國家開放大學電大學習網形考作業題目答案
- 焦點解決短期心理咨詢與治療理論課件
- 紅酒行業市場研究報告
- 臺球斯諾克簡介課件
- 網絡安全管理員四級考試題庫與答案
- 杭州地鐵一號PPP模式的實踐與思考詳解
- 依戀的發展PPT演示課件(PPT 76頁)
- 六年級下冊數學課件--總復習《圖形的運動》北師大版.--共20張PPT
- 6SE70系列變頻器講解及Drive-Monitor調試(工程師培訓)課件
- 武警部隊信息化設計
評論
0/150
提交評論