Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall 2011 1.

Slides:



Advertisements
Similar presentations
Hashes and Message Digests
Advertisements

ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Outline Project 1 Hash functions and its application on security Modern cryptographic hash functions and message digest –MD5 –SHA.
PIITMadhumita Chatterjee Security 1 Hashes and Message Digests.
Hash and MAC Algorithms
Announcements: 1. HW7 due next Tuesday. 2. Inauguration today! Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman,
Hash functions a hash function produces a fingerprint of some file/message/data h = H(M)  condenses a variable-length message M  to a fixed-sized fingerprint.
Announcements:Questions? This week: Discrete Logs, Diffie-Hellman, ElGamal Discrete Logs, Diffie-Hellman, ElGamal Hash Functions and SHA-1 Hash Functions.
Hashes and Message Digest Hash is also called message digest One-way function: d=h(m) but no h’(d)=m –Cannot find the message given a digest Cannot find.
Cryptography and Network Security Hash Algorithms.
Cryptography and Network Security (CS435) Part Ten (Hash and MAC algorithms)
Chapter 4  Hash Functions 1 Overview  Cryptographic hash functions are functions that: o Map an arbitrary-length (but finite) input to a fixed-size output.
Information Security and Management 11
SHA (secure hash algorithm) Jen-Chang Liu, 2005 Adapted from lecture slides by Lawrie Brown.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
COM 5336 Cryptography Lecture 9 Hash, MAC, HMAC
Cryptography and Network Security Chapter 12 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Pertemuan 09 Hash and Message Digest Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Cryptography and Network Security (Various Hash Algorithms) Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Changed by Somesh Jha)
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
HASH Functions.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
Hash and MAC Algorithms Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 12/3/2009 INCS 741: Cryptography 12/3/20091Dr. Monther Aldwairi.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Lect : Hash Functions and MAC. 2 1.Introduction - Hash Function vs. MAC 2.Hash Functions  Security Requirements  Finding collisions – birthday.
CSCE 815 Network Security Lecture 7 Message Authentication Codes And Hash Functions.
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
Data & Network Security
Hash and MAC Functions CS427 – Computer Security
1 Hash Functions. 2 A hash function h takes as input a message of arbitrary length and produces as output a message digest of fixed length
Hash and Mac Algorithms. Contents Hash Functions Secure Hash Algorithm HMAC.
CSCE 815 Network Security Lecture 8 SHA Operation and Kerberos.
Chapter 4 Message Authentication MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Hash Algorithms see similarities in the evolution of hash functions & block ciphers –increasing power of brute-force attacks –leading to evolution in algorithms.
Cryptographic Hash Functions and Protocol Analysis
Chapter 11 Message Authentication and Hash Functions.
Cryptographic Hash Functions Prepared by Dr. Lamiaa Elshenawy
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Hash Functions Ramki Thurimella. 2 What is a hash function? Also known as message digest or fingerprint Compression: A function that maps arbitrarily.
1 Chapter 12: Hash and MAC Algorithms Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal, U of Kentucky)
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.3 Hash Functions.
Cryptographic Hash Functions
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Hash Algorithms Ch 12 of Cryptography and Network Security - Third Edition by William Stallings Modified from lecture slides by Lawrie Brown CIM3681 :
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 12 – Hash Algorithms
Secure Hash Algorithm A SEARIES OF SHA….
CSCE 715: Network Systems Security
Cryptography and Network Security (Various Hash Algorithms)
ICS 454 Principles of Cryptography
CSCE 715: Network Systems Security
ICS 454 Principles of Cryptography
Message Authentication
Hashing Hash are the auxiliary values that are used in cryptography.
Hash Function Requirements
The Secure Hash Function (SHA)
Presentation transcript:

Information Security and Management 11. Cryptographic Hash Functions Chih-Hung Wang Fall

Definition ▫A hash function accepts a variable-size message M as input and produces a fixed-size hash code H(M) ▫Sometime called a message digest ▫Hash Algorithm  MD5  RFC 1321 developed by Ron Rivist at MIT  Secure Hash Algorithm (SHA)  FIPS PUB 180 in 1993 (NIST) in 1995  FISP: Federal Information Processing Standard 2 Hash Function

3 Plaintext M Message Digest Hash value H(M)

 H can be applied to a block of data of any size  H produces a fixed-length output  H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical  For any given code h, it is computationally infeasible to find x such that H(x)=h. This is sometimes referred to in the literature as the one-way property  For any given block x, it is computationally infeasible to find y  x with H(y)=H(x). This is sometimes referred to as weak collision resistance  It is computationally infeasible to find any pair (x,y) such that H(x)=H(y). This is sometimes referred to as strong collision resistance. 4 Requirements of Hash

5 m1m1 m2m2 H(m 1 ) H(m 2 ) It is difficult to find m1 and m2 (m1  m2) such that H(m1)=H(m2)

6 Basic Use of Hash (A)

7 Basic Use of Hash (B)

8 Basic Use of Hash (C)

For a code of length n ▫One-way: 2 n ▫Weak collision resistance: 2 n ▫Strong collision resistance: 2 n/2 9 Security of Hash Functions

MD5 SHA 10 The Famous Hash Functions

1.Append padding bits: pad message so its length is 448 mod Append length: append a 64-bit length value to message 3.Initialize MD buffer: initialise 5-word (160-bit) buffer (A,B,C,D,E) to ( ,efcdab89,98badcfe, ,c3d2e1f0) 4.Process message in 512-bit (16-word) blocks: ▫expand 16 words into 80 words by mixing & shifting ▫use 4 rounds of 20 bit operations on message block & buffer ▫add output to input to form new buffer value 5.Output: output hash value is the final buffer value 11 SHA-1 Logic

Each round has 20 steps which replaces the 5 buffer words thus: (A,B,C,D,E) <-(E+f(t,B,C,D)+S 5 (A)+Wt+Kt),A,S 30 (B),C,D) A,B,C,D,E refer to the 5 words of the buffer t is the step number, 0  t  79 f(t,B,C,D) is nonlinear function for round W t is derived from the message block K t is an additive constant value S k is circular left shift by k bits 12 SHA-1 Compression Function

13 SHA-1 Compression Function

14 SHA-1 Compression Function

15 Function Summarized

80-word Input Sequence W t =S 1 (W t-16  W t-14  W t-8  W t-3 ) 16

SHA

SHA 512(a single bit block) 18

SHA 512 (Elementary operation) 19

SHA 512 (Creation of 80-word input sequence) 20

Brute force attack for SHA-1 is harder (160 vs 128 bits for MD5) SHA-1 is not vulnerable to any known attacks (compared to MD4/5) ?? (Speed) SHA-1 is a little slower than MD5 (80 vs 64 steps) Both designed is simple and compact SHA-1 uses big endian scheme (MD5 uses little endian scheme) 21 Comparison of SHA-1 and MD5

NIST have issued a revision FIPS and adds 3 additional hash algorithms: SHA-256, SHA-384, SHA-512. Designed for compatibility with increased security provided by the AES cipher Structure & detail are similar to SHA-1 and hence analysis should be similar. 22 Revised Secure Hash Standard

23 Comparison of SHA Properties