Module 4 Hash Functions Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.

Slides:



Advertisements
Similar presentations
Lecture 7 Overview. Advanced Encryption Standard 10, 12, 14 rounds for 128, 192, 256 bit keys – Regular Rounds (9, 11, 13) – Final Round is different.
Advertisements

SECURE HASHING ALGORITHM By: Ruth Betcher. Purpose: Authentication Not Encryption Authentication Requirements:  Masquerade – Insertion of message from.
SHA-1 collision found Lukáš Miňo, Richard Bartuš.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
MD Collision Sought Marian Ščerbák University of Pavol Jozef Šafárik Košice.
PIITMadhumita Chatterjee Security 1 Hashes and Message Digests.
1 Chapter 5 Hashes and Message Digests Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
Announcements: 1. HW7 due next Tuesday. 2. Inauguration today! Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman,
Hash functions a hash function produces a fingerprint of some file/message/data h = H(M)  condenses a variable-length message M  to a fixed-sized fingerprint.
Announcements:Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions and SHA-1 Hash Functions.
MD5 Message Digest Algorithm CS265 Spring 2003 Jerry Li Computer Science Department San Jose State University.
Hashes and Message Digest Hash is also called message digest One-way function: d=h(m) but no h’(d)=m –Cannot find the message given a digest Cannot find.
By: Matthew Ng. SHA stands for Secure Hash Algorithm It is based off the Merkle-Dangard hash function There are 3 versions of it with one coming in 2012.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Information Security and Management 11
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
COM 5336 Cryptography Lecture 9 Hash, MAC, HMAC
1 Pertemuan 09 Hash and Message Digest Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 3 Encryption Algorithms & Systems (Part C)
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Team Grey Skies – Pete Biancaniello and Anton Schraut January 18 th, 2012.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
HASH Functions.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Cryptographic Hash Functions June Topics  Overview of Cryptography Hash Function  Usages  Properties  Hashing Function Structure 
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Hashes and Message Digests. 2 Hash Also known as –Message digest –One-way function Function: input message -> output One-way: d=h(m), but not h’(d)
12.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 12 Cryptographic Hash Functions.
Theory of Computation II Topic presented by: Alberto Aguilar Gonzalez.
12.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 12 Cryptographic Hash Functions.
1 Network Security Lecture 5 Hashes and Message Digests Waleed Ejaz
If the hash algorithm is properly designed and distributes the hashes uniformly over the output space, "finding a hash collision" by random guessing is.
Lecture 8 Overview. Secure Hash Algorithm (SHA) SHA SHA SHA – SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Hash Algorithms see similarities in the evolution of hash functions & block ciphers –increasing power of brute-force attacks –leading to evolution in algorithms.
MD5 ALGORITHM past and present. History Initial checking of integrity – checksums, then CRC These are only good at detecting lost information due to hardware.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
Week 4 - Friday.  What did we talk about last time?  Snow day  But you should have read about  Key management.
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
Chapter 5 Hash Functions
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.3 Hash Functions.
Cryptographic Hash Functions
Cryptography and Network Security
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Lecture 9 Overview. RSA Invented by Cocks (GCHQ), independently, by Rivest, Shamir and Adleman (MIT) Two keys e and d used for Encryption and Decryption.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Message Authentication using Message Digests and the MD5 Algorithm Message authentication is important where undetected manipulation of messages can.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 13.Message Authentication.
@Yuan Xue 285: Network Security CS 285 Network Security Hash Algorithm Yuan Xue Fall 2012.
Secure Hash Algorithm A SEARIES OF SHA….
If the hash algorithm is properly designed and distributes the hashes uniformly over the output space, "finding a hash collision" by random guessing is.
If the hash algorithm is properly designed and distributes the hashes uniformly over the output space, "finding a hash collision" by random guessing is.
CSCE 715: Network Systems Security
Cryptographic Hash Function
ICS 454 Principles of Cryptography
ICS 454 Principles of Cryptography
SHA: Secure Hash Algorithm
The Secure Hash Function (SHA)
Presentation transcript:

Module 4 Hash Functions Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation

Definition of a Hash Function Originally created to verify that a transmission was successful Originally created to verify that a transmission was successful If not, then the transmission would be re-sent If not, then the transmission would be re-sent Mainly error detection Mainly error detection Newer ones are for data integrity Newer ones are for data integrity

CRC – Cyclic Redundancy Check Checksum Checksum Detects errors after transmission or storage Detects errors after transmission or storage Problem – if you move a word in the document, but don’t delete it, the checksum remains the same Problem – if you move a word in the document, but don’t delete it, the checksum remains the same Cannot be used reliably for data integrity Cannot be used reliably for data integrity

CRC – (page 2) Several varieties, 8 bit to 64 bit, a few 128 bit checksums Several varieties, 8 bit to 64 bit, a few 128 bit checksums Polynomials Polynomials CRC-1x + 1 (Used in hardware, also known as parity bit) CRC-1x + 1 (Used in hardware, also known as parity bit)parity bitparity bit CRC-5 x5 + x2 + 1 (used in USB token packets) CRC-5 x5 + x2 + 1 (used in USB token packets)USB CRC-7 x7 + x3 + 1 (used in some telecom systems) CRC-7 x7 + x3 + 1 (used in some telecom systems) CRC-12 x12 + x11 + x3 + x2 + x + 1 (used in telecom systems) CRC-12 x12 + x11 + x3 + x2 + x + 1 (used in telecom systems)

Crytographic Hash Function Should not be able to predict the hash value of a message Should not be able to predict the hash value of a message Two messages should not have the same hash value Two messages should not have the same hash value Any change should result in a different hash value Any change should result in a different hash value

Message Digest 2 Created by Ronald Rivest in 1989 Created by Ronald Rivest in bit hash value 128 bit hash value Is still used for public key encryption and digital signatures Is still used for public key encryption and digital signatures Done at MIT Done at MIT

MD4 Developed by Rivest to address the problems with MD2 Developed by Rivest to address the problems with MD2 Created in 1990 Created in bit hash 128 bit hash 32 digit hexadecimal 32 digit hexadecimal First a message is padded to be 64 bits shy of a multiple of 512 bits First a message is padded to be 64 bits shy of a multiple of 512 bits

How MD4 works 64 bit data stream which contains the length of the original message is now appended to the padded message 64 bit data stream which contains the length of the original message is now appended to the padded message A four word (32 bits each) buffer is used to generate the message digest A four word (32 bits each) buffer is used to generate the message digest Process each 16 word block of the message Process each 16 word block of the message Output the MD Output the MD

MD5 Developed in 1991 to address weaknesses in MD4 Developed in 1991 to address weaknesses in MD4 128 bit cryptographic hash 128 bit cryptographic hash Very similar to MD4, but with some changes Very similar to MD4, but with some changes Still reliable for data integrity, but not for malicious attacks Still reliable for data integrity, but not for malicious attacks

One MD5 operation — MD5 consists of 64 of these operations, grouped in four rounds of 16 operations. F is a nonlinear function; one function is used in each round. Mi denotes a 32-bit block of the message input, and Ki denotes a 32-bit constant, different for each operation.

Collisions with MD5 August 2004 collisions for the full MD5 were announced by Xiaoyun Wang, Dengguo Feng, Xuejia Lai and Hongbo Yu. August 2004 collisions for the full MD5 were announced by Xiaoyun Wang, Dengguo Feng, Xuejia Lai and Hongbo Yu. Their analytical attack was reported to take only one hour on an IBM p690 cluster. (Up to 1TB of ECC Chipkill system memory) Their analytical attack was reported to take only one hour on an IBM p690 cluster. (Up to 1TB of ECC Chipkill system memory)

SHA Group SHA-0 Developed in 1993 SHA-0 Developed in 1993 Secure Hash Algorithm Secure Hash Algorithm Pushed by the NSA Pushed by the NSA Problems arose, replaced by SHA-1 Problems arose, replaced by SHA bit digest 160 bit digest SHA-0 had near collisions with 142 of the 160 being equal SHA-0 had near collisions with 142 of the 160 being equal

One iteration within the SHA-1 compression function. A, B, C, D and E are 32-bit words of the state; F is a nonlinear function that varies; <<< denotes a left bit rotation by s places; s varies for each operation. The red square denotes addition modulo K t is a constant.

Collisions with SHA-1 In February 2005, an attack by Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu was announced. In February 2005, an attack by Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu was announced. Xiaoyun WangYiqun Lisa Yin Hongbo Yu Xiaoyun WangYiqun Lisa Yin Hongbo Yu The attacks can find collisions in the full version of SHA-1, requiring fewer than 2^69 operations The attacks can find collisions in the full version of SHA-1, requiring fewer than 2^69 operations

What’s Next? Stronger hashes Stronger hashes SHA-256, SHA-384, SHA-512 SHA-256, SHA-384, SHA-512 Does it affect you? Does it affect you? Maybe… Maybe…

As an Expert Witness Feel free to tell what you use hashes for Feel free to tell what you use hashes for Do not attempt to describe them, simply say I am not a mathematician Do not attempt to describe them, simply say I am not a mathematician Do say, it is approved by my agency and by the NSA or NIST Do say, it is approved by my agency and by the NSA or NIST