Your Security in the IT Market www.i.cz Beyond the MD5 Collisions Daniel Joščák, S.ICZ a.s. & MFF UK 04/05/2007, SPI Brno.

Slides:



Advertisements
Similar presentations
Which Hash Functions will survive?
Advertisements

Applications of SAT Solvers to Cryptanalysis of Hash Functions
Hashes and Message Digests
EFORWOOD Tools for Sustainability Impact Assessment of the Forestry-Wood Chain EFORWOOD Tools for Sustainability Impact Assessment of the Forestry-Wood.
5-2 Parallel and Perpendicular Lines Warm Up Problem of the Day
Bayesian Belief Propagation
11.1 Vis_04 Data Visualization Lecture 11 Information Presentation.
P2N: Cloud Control David Tarrant Ben OSteen
Visual Formalisms Message Sequence Charts Book: Chapter 10.
Merkle Damgard Revisited: how to Construct a hash Function
Then/Now You named angle pairs formed by parallel lines and transversals. Use theorems to determine the relationships between specific pairs of angles.
Chapter 8 Recursion. 8.1 Recursively Defined Sequences.
October 2nd 2013 * 13:30 – 17:30 * SZA Vienna
Princess Sumaya University
EPI809/Spring Fishers Exact Test Fishers Exact Test is a test for independence in a 2 X 2 table. It is most useful when the total sample size and.
Karnaugh Map Adjacent Squares
Karnaugh Map Adjacent Squares
Summer ’12 AP Computer Science APCS Summer Assignments Read thoroughly this ppt and solve examples 6 and 7.
Computer Science and Engineering Diversified Spatial Keyword Search On Road Networks Chengyuan Zhang 1,Ying Zhang 2,1,Wenjie Zhang 1, Xuemin Lin 3,1, Muhammad.
QED: A Simplifier for Concurrent Programs Shaz Qadeer Microsoft Research Joint work with Tayfun ElmasAli SezginSerdar Tasiran.
Computer Architecture CST 250 K-Map Prepared by:Omar Hirzallah.
KU College of Engineering Elec 204: Digital Systems Design
CENG 241 Digital Design 1 Lecture 3 Amirali Baniasadi
Global States and Checkpoints
Isabelle Stanton Chalermpong Worawannotai
ALGORITHMS AND FLOWCHARTS
Using Implications for Online Error Detection Nuno Alves, Jennifer Dworak, and R. Iris Bahar Division of Engineering Brown University Providence, RI
Seminario Swarm Seminario su Swarm Pietro Terna web.econ.unito.it/terna.
TECH 2018 (Week 16) Topic: JavaScript Parminder Kang Home: Phones Off Please.
PODC 2007 © 2007 IBM Corporation Constructing Scalable Overlays for Pub/Sub With Many Topics Problems, Algorithms, and Evaluation G. Chockler, R. Melamed,
3/3 Factoid for the day: “Most people have more than the average number of feet” & eyes & ears & noses.
Hash Function. What are hash functions? Just a method of compressing strings – E.g., H : {0,1}*  {0,1} 160 – Input is called “message”, output is “digest”
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
About a new generation of block ciphers and hash functions - DN and HDN Vlastimil Klíma Independent consultant
Your Security in the IT Market Hash Function Design: Overview of the basic components in SHA-3 competition Daniel Joščák, S.ICZ a.s. & MFF UK.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Information Security and Management 11
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Brand-New Hash Function   BeeM A. Satoh SCIS2006 SHA-1 Broken! Prof. Xiaoyun Wang.
Theory of Computation II Topic presented by: Alberto Aguilar Gonzalez.
1 Hash Functions. 2 A hash function h takes as input a message of arbitrary length and produces as output a message digest of fixed length
MD5 ALGORITHM past and present. History Initial checking of integrity – checksums, then CRC These are only good at detecting lost information due to hardware.
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
Cryptographic Hash Functions
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Dan Boneh Collision resistance The Merkle-Damgard Paradigm Online Cryptography Course Dan Boneh.
Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall
Homework #2 J. H. Wang Oct. 31, 2012.
Data Integrity / Data Authentication. Definition Authentication (Signature) algorithm - A Verification algorithm - V Authentication key – k Verification.
CS555Spring 2012/Topic 141 Cryptography CS 555 Topic 14: CBC-MAC & Hash Functions.
If the hash algorithm is properly designed and distributes the hashes uniformly over the output space, "finding a hash collision" by random guessing is.
MD5 A Hash Algorithm….
Cryptographic Hash Functions
Cryptographic Hash Functions
Cryptographic Hash Functions
MD5 A Hash Algorithm….
Cryptography Lecture 19.
دانشگاه شهیدرجایی تهران
Practical Aspects of Modern Cryptography
CS/ECE 478 Introduction to Network Security Dr. Attila Altay Yavuz
تعهدات مشتری در کنوانسیون بیع بین المللی
Targeted Online Password Guessing: An Underestimated Threat
Lecture 4.1: Hash Functions: Introduction
CIS 4930/6930 – Privacy-Preserving and Trustworthy Cyber-Systems Dr
Cryptography Lecture 13.
SHA: Secure Hash Algorithm
Seyed Amir Hossain Naseredini
Collapse-binding quantum commitments without random oracles
Cryptographic Hash Functions
Presentation transcript:

Your Security in the IT Market Beyond the MD5 Collisions Daniel Joščák, S.ICZ a.s. & MFF UK 04/05/2007, SPI Brno

Your Security in the IT Market Chewing functions

Your Security in the IT Market Chewing functions

Your Security in the IT Market Iterated hash functions ►We would like to have a hash function h h : {0,1}* → {0,1} n ►We have so-called compression function f f : {0,1} b → {0,1} n ►Pad a message m to be a multiple of b bits long ►Iterate the compression function f

Your Security in the IT Market Collisions in MD5 ►Messages (M0||M1) ≠ (N0||N1), h (M0||M1) = h (N0||N1) ►We have real collisions producing algorithms and methods ●Wang et al. 04 ●Klíma 05 ●Liang and Lai 05 ●Stevens 05 and 06 (new target collisions) ●…

Your Security in the IT Market Attempts to improve MD5 ►3C, 3C+, … constructions by Gauravaram, Millan, Dawson, and Viswanathan 06 ►Ring Iterative Structures by Su, Yang, Yang, Zhang 06. ►Keep the compression function f and change Merkle-Damgård construction to obtain “better” function

Your Security in the IT Market Attempts to improve MD5 3C 3C+ Single Feedback Multiple Feedback

Your Security in the IT Market Properties of the collisions ►Messages (M0||M1) ≠ (N0||N1), h (M0||M1) = h (N0||N1) ►Fixed message and chaining differences: ●Δ0 = M0 − N0 = (0, 0, 0, 0, 2^31, 0, 0, 0, 0, 0, 0, +2^15, 0, 0, 2^31, 0) ●Δ1 = M1 − N1 = (0, 0, 0, 0, 2^31, 0, 0, 0, 0, 0, 0, −2^15, 0, 0, 2^31, 0) ●δ = IV1 − IV’1 = f(IV, M0) − f(IV, N0) = (2^31, 2^31 + 2^25, 2^31 + 2^25, 2^31 + 2^25)

Your Security in the IT Market 4-block collisions for 3C ►Algorithms work for any IV and have the fixed chaining differences ►We can find (M1||M2||M3||M4) ≠ (N1||N2||N3||N4) s.t. ●h 3C (M1||M2||M3||M4) = h 3C (N1||N2||N3||N4) ►Find 2 pairs of MD5 collisions such that: ●h(IV 0,M1||M2) = h(IV 0,N1||N2) = IV 2, ●h(IV 2,M3||M4) = h(IV 2,N3||N4).

Your Security in the IT Market 5-block collisions for 3C+ ►(M1||M2||M3||M4||M5) ≠ (N1||N2||N3||N4||N5) such that ●h 3C+ (M1||M2||M3||M4||M5) = h 3C+ (N1||N2||N3||N4||N5) ►Find 2 pairs of MD5 collisions such that: ●M1 = N1 ●h(IV 1,M2||M3) = h(IV 1,N2||N3) = IV 2, ●h(IV 3,M4||M5) = h(IV 3,N4||N5).

Your Security in the IT Market 4-block collisions for simple feedback ring iterative struct. ►We can find (M1||M2||M3||M4) ≠ (N1||N2||N3||N4) s.t. ●h sf (M1||M2||M3||M4) = h sf (N1||N2||N3||N4) ►Find just one pair of MD5 collisions: ●M1 = N1 ●h(IV 1,M2||M3) = h(IV 1,N2||N3), ●M4 = N4.

Your Security in the IT Market Conclusions ►Be aware of quick “secure” changes in algorithms ►Time for Advanced Hash Standard ●Competition Organized by NIST ●Submission deadline 3Q 2008 ►Problems are gift (Bruno Buchberger)

Your Security in the IT Market Thank you for your attention. Daniel Joščák S.ICZ a.s. MFF UK, Dept. of Algebra