MSIT 543 Cryptography Concepts and Techniques Hashes

Slides:



Advertisements
Similar presentations
Lecture 7 Overview. Advanced Encryption Standard 10, 12, 14 rounds for 128, 192, 256 bit keys – Regular Rounds (9, 11, 13) – Final Round is different.
Advertisements

SECURE HASHING ALGORITHM By: Ruth Betcher. Purpose: Authentication Not Encryption Authentication Requirements:  Masquerade – Insertion of message from.
9/21/12. I can identify which factors are prime numbers. LEARNING TARGET.
Numbers Prime Factors: Every number can be broken down into the smallest numbers which when multiplied together will eventually make that number...
1 Counter-measures Threat Monitoring Cryptography as a security tool Encryption Digital Signature Key distribution.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Dividing by a Fraction. What does it mean to divide by a fraction?
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
Computer encryption is… Based on the science of cryptography.
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 Lecture 11 Network Security (1)
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Confidentiality Confidentiality is maintained so long as private keys are secure. Authenticity is possible via public-key encryption by encrypting messages.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
MD5 ALGORITHM past and present. History Initial checking of integrity – checksums, then CRC These are only good at detecting lost information due to hardware.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
Computer and Network Security - Message Digests, Kerberos, PKI –
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 11 September 23, 2004.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Web Applications Security Cryptography 1
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Key Exchange References: Applied Cryptography, Bruce Schneier
Computer Communication & Networks
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
MD5 A Hash Algorithm….
Cryptographic Hash Functions
Cryptographic Hash Function
B. R. Chandavarkar CSE Dept., NITK Surathkal
Chapter 5: The Art of Ensuring Integrity
Chapter 7 Network Security
RSA A public Key Algorithm.
Public-key Cryptography
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Big Numbers: Mathematics and Internet Commerce
Cryptographic Hash Functions
Number Theory (Chapter 7)
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
NET 311 Information Security
Cryptographic Hash Functions Part I
MD5 A Hash Algorithm….
ICS 454 Principles of Cryptography
Digital Signatures Campbell R. Harvey Duke University, NBER and
Recent Developments on Multimedia and Secure Networking Technologies
ICS 454 Principles of Cryptography
MSIT 543 Cryptography Concepts and Techniques Symmetric Key Encryption
Engineering Secure Software
Error Detection Neil Tang 9/26/2008
Instructor Materials Chapter 5: The Art of Ensuring Integrity
MSIT 543 Cryptography Concepts and Techniques How RSA Encryption Works
Book: Stallings (5th) and Forouzan (3rd)
Cryptographic Hash Functions Part I
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Exercise: Hashing, Password security, And File Integrity
Recent Developments on Multimedia and Secure Networking Technologies
Hashing Hash are the auxiliary values that are used in cryptography.
Security: Integrity, Authentication, Non-repudiation
Lecture 4: Hash Functions
Cryptography Fundamentals
Hash Function Requirements
CRYPTOGRAPHY & NETWORK SECURITY
Digital Signature Standard (DSS)
Introduction to Encryption Technology
Presentation transcript:

MSIT 543 Cryptography Concepts and Techniques Hashes Dr Jeffrey A Robinson

Hashes – One way functions Easy one direction Difficult or impossible to reverse For example: Modulus mathematics Multiplying or dividing by very large prime numbers and taking the last hundred digits or so. Pseudo-random number generator, using message as the “seed”

Hashes Hashes are numbers generated using a one way algorithm (like modulus mathematics)

How Hashes Work Modulus functions Checksums CRCs MDA SHA-256 Many proprietary (e.g. login hashes, CANON pictures)

How Hashes Work Examples of applications Error Detecting Codes Lotids Part numbers VIN numbers Passwords Fixity Digital Watermarks - Photos Digital fingerprints Computer Forensics