Week 4 - Friday.  What did we talk about last time?  Snow day  But you should have read about  Key management.

Slides:



Advertisements
Similar presentations
Hashes and Message Digests
Advertisements

Lecture 5: Cryptographic Hashes
Hash Function. What are hash functions? Just a method of compressing strings – E.g., H : {0,1}*  {0,1} 160 – Input is called “message”, output is “digest”
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
1 Chapter 5 Hashes and Message Digests Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Announcements: 1. HW7 due next Tuesday. 2. Inauguration today! Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman,
Announcements:Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions and SHA-1 Hash Functions.
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
CS470, A.SelcukHash Functions1 Cryptographic Hash Functions CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CS526Topic 5: Hash Functions and Message Authentication 1 Computer Security CS 526 Topic 5 Cryptography: Cryptographic Hash Functions And Message Authentication.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptographic Hash Functions July Topics  Overview of Cryptography Hash Function  Usages  Properties  Hashing Function Structure  Attack on.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 15 Lecture’s outline Public algorithms (usually) that are each other’s inverse.
Week 5 - Monday.  What did we talk about last time?  Cryptographic hash functions.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Acknowledgements: William Stallings.William Stallings All rights Reserved Session 4 Public Key Cryptography (Part 2) Network Security Essentials Application.
Digital Signatures Good properties of hand-written signatures: 1. Signature is authentic. 2. Signature is unforgeable. 3. Signature is not reusable (it.
HASH Functions.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
Cryptographic Hash Functions June Topics  Overview of Cryptography Hash Function  Usages  Properties  Hashing Function Structure 
IS 302: Information Security and Trust Week 5: Integrity 2012.
Lecture 4.1: Hash Functions, and Message Authentication Codes CS 436/636/736 Spring 2015 Nitesh Saxena.
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
Chapter 21 Public-Key Cryptography and Message Authentication.
Week 4 - Wednesday.  What did we talk about last time?  RSA algorithm.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
1 Network Security Lecture 5 Hashes and Message Digests Waleed Ejaz
6fb52297e004844aa81be d50cc3545bc Hashing!. Hashing  Group Activity 1:  Take the message you were given, and create your own version of hashing.  You.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Cryptographic Hash Functions and Protocol Analysis
Lecture 2: Introduction to Cryptography
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Modern Cryptography.
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 13.Message Authentication.
Cryptography Hyunsung Kim, PhD University of Malawi, Chancellor College Kyungil University February, 2016.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
@Yuan Xue 285: Network Security CS 285 Network Security Hash Algorithm Yuan Xue Fall 2012.
Message Integrity and Message Authentication
Cryptographic Hash Function
Chapter 5: The Art of Ensuring Integrity
최신정보보호기술 경일대학교 사이버보안학과 김 현성.
Cryptographic Hash Functions Part I
ICS 454 Principles of Cryptography
Practical Aspects of Modern Cryptography
ICS 454 Principles of Cryptography
Cryptographic Hash Functions Part I
Hashing Hash are the auxiliary values that are used in cryptography.
Lecture 4: Hash Functions
Hash Function Requirements
Presentation transcript:

Week 4 - Friday

 What did we talk about last time?  Snow day  But you should have read about  Key management

Claire Chambless

 What magic happens when you type your password into…  Windows or Unix to log on?  Amazon.com to make a purchase?  A Twilight fan site so that you can post on the forums?  A genie from the 8 th dimension travels back in time and checks to see what password you originally created

 The password is checked against a file on a computer  But, how safe is the whole process?  Twilight fan site may not be safe at all  Amazon.com is complicated, much depends on the implementation of public key cryptography  What about your Windows or Unix computer?

 Your computer needs to be able read the password file to check passwords  But, even an administrator shouldn’t be able to read everyone’s passwords  Hash functions to the rescue!

 A cryptographic (or one-way) hash function (called a cryptographic checksum in the book) takes a variable sized message M and produces a fixed-size hash code H(M)  Not the same as hash functions from data structures  The hash code produced is also called a digest  It can be used to provide authentication of both the integrity and the sender of a message  It allows us to store some information about a message that an attacker cannot use to recover the message

 The pigeonhole principle says that if you try to put m items into n categories, where m > n, then at least 2 things will be in the same category  Imagine that you have a 40,000 byte message and a 256-bit hash digest  How does the pigeonhole principle apply?

 When two messages hash to the same value, this is called a collision  Because of the pigeonhole principle, collisions are unavoidable  The key feature we want from our hash functions is that collisions are difficult to predict

Given a digest, should be hard to find a message that would produce it One-way property Preimage Resistance Given a message m, it should be hard to find a different message that has the same digest Second Preimage Resistance Should be hard to find any two messages that hash to the same digest (collision) Collision Resistance

A small change in input should correspond to a large change in output Avalanching Hash function should work on a block of data of any size Applicability Output should be a fixed length Uniformity It should be fast to compute a digest in software and hardware No longer than retrieval from secondary storage Speed

 Example (from Wikipedia) of significant changes in hash output with small input changes  SHA-1

 Instead of storing the actual passwords, Windows and Unix machines store the hash of the passwords  When someone logs on, the operating system hashes the password and compares it to the stored version  No one gets to see your original password!

 Below is an example of what a password file might be look like. NameHash Ahmad IfW{6Soo Bai Li 853aE90f Carmen D390&063 Deepak CWc^Q3Ge Erica e[6s_N*X

 What’s the probability that Ahmad has the same password (or a password that hashes to the same value) as Bai Li?  Very small!  What’s the probability that anyone has the same password (or a password that hashes to the same value) as anyone else?  Not nearly as small!

 If you are the administrator of a large system, you might notice that two people have the same password hash  With people's password habits, the odds are very high that their passwords are the same  To add to the semantic security of such schemes random salt (often 8 bits or so) is added to the end of a password  When checking a password against the hash, the system tries all 2 8 possible values for the salt

 Message Digest Algorithm 5  Very popular hashing algorithm  Designed by Ron Rivest (of RSA fame)  Digest size: 128 bits  Security  Completely broken  Reasonable size attacks (2 32 ) exist to create two messages with the same hash value  MD5 hashes are still commonly used to check to see if a download finished without error

 Secure Hash Algorithm  Created by NIST  SHA-0 was published in 1993, but it was replaced in 1995 by SHA-1  The difference between the two is only a single bitwise rotation, but the NSA said it was important  Digest size: 160 bits  Security  Mostly broken  Attacks running in time exist  SHA-2 is a successor family of hash functions  224, 256, 384, 512 bit digests  Better security, but not as widely used  Designed by the NSA

 NIST just had the contest for SHA-3  When I last taught this class, it was down to five finalists:  BLAKE  Grøstl  JH  Keccak  Skein  Keccak was announced as the winner in 2012  As with AES, Keccak beat out its competitors partly because it's so fast  Joan Daemen (of Rijndael fame) was also one of its designers

 Keccak uses a completely different form of hashing than SHA-0, SHA-1, and SHA-2  Although there are only theoretical attacks on SHA-1 and no real attacks on SHA-2, the attacks on SHA-0 made people nervous about hash functions following the same design  Keccak also allows for variable size digests, for added security  224, 256, 384, and 512 are standard for SHA-3, but it is possible to go arbitrarily high in Keccak

 Attacks on cryptographic hash functions

 Read Section 2.8  Keep working on Project 1  Keep working on Assignment 2