Download presentation
Presentation is loading. Please wait.
Published byNathan Flynn Modified over 9 years ago
1
Your Security in the IT Market www.i.cz Hash Function Design: Overview of the basic components in SHA-3 competition Daniel Joščák, S.ICZ a.s. & MFF UK 07/05/2009, SPI Brno
2
Your Security in the IT Market www.i.cz Hash functions in cryptology ►Key component of many protocols ●Electronic signature ●Integrity check ●One-way function ●… ►Fingerprints or message digests
3
Your Security in the IT Market www.i.cz Good hash ftion must be ►Collision resistant: it is hard to find two distinct inputs m 1 and m 2, s.t. H(m 1 ) = H(m 2 ). ►1 st preimage resistant: given h, it is hard to find any m s.t. h = H(m). ►2 nd preimage resistant: given m 1, it is hard to find m 2 ≠ m 1 s.t. H(m 1 ) = H(m 2 ) ►Efficient (speed matters)
4
Your Security in the IT Market www.i.cz Why to build them? ►Weaknesses in old wide spread h. f. ●MD2, MD4, MD5, SHA 1 ►Real collisions producing algorithms ●Wang et al. 04 ●Klíma 05 ●Rechberger et al. 06 ●Stevens 05 and 06 (new target collisions) ‘ former functions
5
Your Security in the IT Market www.i.cz Need for a new function new candidates for SHA-3 ►“only” SHA 2 functions are fine ►SHA3 competition organized by NIST ●deadline 31. oct. 2008 ●51 submissions
6
Your Security in the IT Market www.i.cz Areas for research and improvements 1.Mode of use for compression function 2.Compression function itself
7
Your Security in the IT Market www.i.cz Improvements of Merkle- Damgård construction
8
Your Security in the IT Market www.i.cz HAIFA, wide pipes, output transformation ►Examples: ARIRANG, BMW, Cheetah,Chi, Echo, Edon-R, Crunch, ECHO, ECOH, Grostl, JH, Keccak, Lux, Lane, Luffa, Lux, Skein, MD6, SIMD, Vortex…
9
Your Security in the IT Market www.i.cz Tree structure ►Example: MD6
10
Your Security in the IT Market www.i.cz Sponge structure ►Absorbing ●Initialize state ●XOR some of the message to the state ●Apply compression function ●XOR some more of the message into the state ●Apply compression function… ►Squeezing ●Apply compression function ●Extract some output ●Apply compression function ●Extract some output ●Apply compression function … ►Examples: Keccak, Luffa.
11
Your Security in the IT Market www.i.cz Improvements of Compression function
12
Your Security in the IT Market www.i.cz One step of compr. ftion ‘ MD5 ‘ SHA-1 ‘ SHA-2
13
Your Security in the IT Market www.i.cz Feedback Shift Register ►Pros: efficiency in HW, known theory from stream ciphers, easy to implement ►Cons: SW implementation, stream cipher weaknesses ►Examples: MD6, Shabal, Essence, NaSHA
14
Your Security in the IT Market www.i.cz Feistel Network ►Pros: block cipher theory, easy to implement ►Cons: can not be generalized ►Examples: ARIRANG, BLAKE, Chi, CRUNCH, DynamicSHA2, JH, Lesamnta, Sarmal, SIMD, Skein, TIB3
15
Your Security in the IT Market www.i.cz S-boxes ►Pros: theory from block ciphers, speed in HW ►Cons: often implemented as look-up tables - side channel attacks ►Examples: Cheetah, Chi, CRUNCH, ECHO, ECOH, Grostl, Hamsi, JH, Khichidy, LANE, Lesamnta, Luffa, Lux, SANDstorm, Sarmal, SHAvite-3, SWIFFTX, TIB3. (33 out of 51 candidates uses S-Boxes) 01 01101 11000
16
Your Security in the IT Market www.i.cz MDS Matrixes ►Pros: mathematical background and proven diffusion properties ►Cons: memory requirements ►Examples: ARIRANG, Cheetah, ECHO, Fugue, Grostl, JH, LANE, Lux, Sarmal, Vortex.
17
Your Security in the IT Market www.i.cz Where to look at candidates: ►NIST webpage: http://csrc.nist.gov/groups/ST/hash/sha- 3/index.html ►Hash ZOO http://ehash.iaik.tugraz.at/index.php?title= The_SHA-3_Zoo&oldid=3106 ►Ebash http://bench.cr.yp.to/results- hash.html ►Classification of the SHA-3 Candidates Cryptology ePrint Archive: Report 511/2008, http://eprint.iacr.org/
18
Your Security in the IT Market www.i.cz Conclusion ►Do not use MD5, MD4, MD2 ►SHA-1 is not recommended after 2009 ►Use SHA-2 instead (no weaknesses) or ►SHA-3 standard is coming in 2-3 years ►Cryptanalysis of current submissions is expected ►Second round candidates coming soon (june-august 2009, 15(?) algorithms)
19
Your Security in the IT Market www.i.cz Thank you for your attention. Daniel Joščák daniel.joscak@i.cz +420 724 429 248 S.ICZ a.s. www.i.cz MFF UK, Dept. of Algebra
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.