Hashing Algorithms: SHA-3 CSCI 5857: Encoding and Encryption.

Slides:



Advertisements
Similar presentations
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Advertisements

Origins  clear a replacement for DES was needed Key size is too small Key size is too small The variants are just patches The variants are just patches.
“Advanced Encryption Standard” & “Modes of Operation”
Chap. 5: Advanced Encryption Standard (AES) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
The Advanced Encryption Standard (AES) Simplified.
 Stream ciphers o Encrypt chars/bits one at a time o Assume XOR w the key, need long key to be secure  Keystream generators (pseudo-random key) o Synchronous.
Advanced Encryption Standard
Cryptography and Network Security
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Algorithm Scheme. AddRoundKey Each round uses four different words from the expanded key array. Each column in the state matrix is XORed with a different.
Announcements: 1. HW7 due next Tuesday. 2. Inauguration today! Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman,
1 A simple algebraic representation of Rijndael Niels Ferguson Richard Schroeppel Doug Whiting.
Advanced Encryption Standard(AES) Presented by: Venkata Marella Slide #9-1.
AES clear a replacement for DES was needed
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
RIJNDAEL Arta Doci University Of Colorado.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Cryptography and Network Security Chapter 5 Fourth Edition by William Stallings.
Lecture 23 Symmetric Encryption
CS470, A.SelcukAfter the DES1 Block Ciphers After the DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Cryptography and Network Security
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
9/17/15UB Fall 2015 CSE565: S. Upadhyaya Lec 6.1 CSE565: Computer Security Lecture 6 Advanced Encryption Standard Shambhu Upadhyaya Computer Science &
Classical &ontemporyryptology 1 AESAES Classical &ontemporyryptology 2 Advanced Encryption Standard Since DES was becoming less reliable as new cryptanalysis.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
AES Background and Mathematics CSCI 5857: Encoding and Encryption.
Information Security Lab. Dept. of Computer Engineering 122/151 PART I Symmetric Ciphers CHAPTER 5 Advanced Encryption Standard 5.1 Evaluation Criteria.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
 Cryptography is the science of using mathematics to encrypt and decrypt data.  Cryptography enables you to store sensitive.
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
Cryptography Lecture 17: Advanced Encryption Standard (AES) Piotr Faliszewski.
Fifth Edition by William Stallings
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
1 Chapter 12: Hash and MAC Algorithms Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal, U of Kentucky)
Network Security Lecture 3 Secret Key Cryptography
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
The Advanced Encryption Standard Part 1: Overview
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Practical Aspects of Modern Cryptography Josh Benaloh & Brian LaMacchia.
Triple DES.
Cryptography and Network Security
School of Computer Science and Engineering Pusan National University
Data Security and Encryption (CSE348)
AES Objectives ❏ To review a short history of AES
Advanced Encryption Standard (Symmetric key Algorithm)
Practical Aspects of Modern Cryptography
Fifth Edition by William Stallings
Advanced Encryption Standard
SYMMETRIC ENCRYPTION.
Advanced Encryption Standard
Origins AES = current federal standard for symmetric crypto (replacing DES) DES Key size is too small The variants are just patches can use Triple-DES.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Seyed Amir Hossain Naseredini
Advanced Encryption Standard
Blowfish Encryption Algorithm
Presentation transcript:

Hashing Algorithms: SHA-3 CSCI 5857: Encoding and Encryption

Outline NIST SHA-3 competition Overall structure of SHA-3 as sponge function State representation in three dimensions SHA-3 round functions –Column-based parity function –Shifts in third dimension –Mixing in xy dimensions –Nonlinear row function –Round constant

3 SHA-3 Competition Open competition by NIST to design new standard for hashing algorithm –Ideally different from SHA2 –Announced in 2008, Finalists chosen in 2010 BLAKE Grøstel (Lars Knudsen) JH Keccak (Joan Daemen) Skein (Niels Ferguson, Bruce Schneier) Winner: Keccak

4 SHA-3 Structure Overall structure based on sponge functions –Receive input one block at a time from message (the “absorbing” stage) –Produce output of as many blocks as needed one block at a time (the “squeezing” stage)

SHA-3 Structure Each stage combines –Next block of message M –Bits from previous stage Output of previous round divided into: –“Rate”: r bits XORed with next message block –“Capacity”: c bits of state data passed directly from previous round –Both initially all 0’s 5

SHA-3 Structure Sizes for r + c: –25 –50 –100 –200 –400 –800 – “Lightweight” permutation: r = 40, c = 160 SHA-3 standard: r = 1088, c = 512

Keccak State Representation 3-dimensional array –Bit value b x,y,z 5 x 5 x 2 L –5 rows –5 columns –2 L “slices” –L = 0 – 6 for lane size = 1, 2, 4, 8, 16, 32, or 64 state size = 25, 50, 100, 200, 400, 800, or

Keccak State Representation Row Column Lane Slice 8

Keccak State Representation r-bit plaintext blocks read in one lane at a time –Lane size = 2 L –2 L /r lanes in rate –Remaining lanes in capacity Lane i (x, y) = Lane i-1 (x, y)  M i (x + 5*y) for lanes in rate Lane i (x, y) = Lane i-1 (x, y) for lanes in capacity 9

Keccak-f Permutation Function of form (r i, c i ) = f (r i-1  m i, c i-1 ) Basic ideas similar to AES: Stages within function with different purposes  : parity function to mix bits across columns  : diffusion of values along lanes based on matrix multiplication over GF(5)  : diffusion of values in slice in both x and y direction  : nonlinear function that alters rows  : combination with round constant (different for each round) 10

Keccak  function Goal: Diffusion across columns of state Parity function of values within a column C x,z = b x,1,z  b x,2,z  b x,3,z  b x,4,z  b x,5,z Each bit is function of parity of adjacent columns b x,y,z = b x,y,z  C x-1,z  C x+1,z 11

Keccak  function b x,y,z = b x,y,z  C x-1,z  C x+1,z 12

Keccak  function Tweaked to involve a column from adjacent slice –Additional diffusion across slices b x,y,z = b x,y,z  C x-1,z  C x+1,z-1 13

Keccak  function Goal: Complex diffusion along lanes –Sort of like ShiftRows, but more complex formula for how much each lane shifted 14

Keccak  function b x,y,z = b x,y,(z-(t+1)(t+2)/2) –t is complex function of (x, y) –Expressed as table 15

Keccak  function Goal: Disturb horizontal/vertical alignments in slice –Otherwise, could get repeated sequences of states 16

Keccak  function b y, 2x+3y, z = b x,y,z based on Example: (3, 2)  (2, 12) = (2, 2) –Note: (0, 0) in center for this transformation

Keccak  function Goal: Make each round nonlinear function of previous round –Prevent linear cryptanalysis attacks 18 Row at round t – 1 Same row at round t

Keccak  function Function from each row to itself (“mixing” bits within same row) b x,y,z = b x,y,z  (  b (x+1), y, z  b (x+2), y, z ) 19

Keccak  function Goal: Different behavior each round –Otherwise, could have fixed states which are same in every round b 0,0,z = b 0,0,z  RCON(i) –Modify center of each slice each round –Changes propagate to all bits 20

Keccak  function Round constants created as simple linear function shift register –Last bit XOR function of other bits –Bits shifted right each iteration 21

Keccak Round Function Functions applied in order listed above If S i = S rate + S capacity is state after round i Then S i+1 =  (  (  (  (  (S rate  M i + S capacity ))))) Number of rounds = L = 24 rounds in full SHA-3 22

Keccak Evaluation High diffusion, nonlinearity Efficiency –Bitwise operations –Complex functions implemented as simple tables –Few rounds Very different than SHA-2 –SHA-2 still secure now –But if weakness found in SHA-2, would be very unlikely to affect SHA-3 –Would then have immediate replacement for SHA-2 23