




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法1Cryptography and Network Security(Various Hash Algorithms)Fourth Editionby William StallingsLecture slides by Lawrie Brown(Changed by Somesh Jha)CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法2Birthday Attacks mi
2、ght think a 64-bit hash is secure but by Birthday Paradox is not birthday attack works thus: opponent generates 2m/2 variations of a valid message all with essentially the same meaning opponent also generates 2m/2 variations of a desired fraudulent message two sets of messages are compared to find p
3、air with same hash (probability 0.5 by birthday paradox) have user sign the valid message, then substitute the forgery which will have a valid signature conclusion is that need to use larger MACsCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法3Hash Function Properties a Hash Funct
4、ion produces a fingerprint of some h = H(M) condenses a variable-length message M to a fixed-sized fingerprint assumed to be publicCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法4Requirements for Hash Functionscan be applied to any sized message Mproduces fixed-length output his
5、easy to compute h=H(M) for any message Mgiven h is infeasible to find x s.t. H(x)=hone-way propertygiven x is infeasible to find y s.t. H(y)=H(x)weak collision resistanceis infeasible to find any x,y s.t. H(y)=H(x)strong collision resistanceCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全
6、(不同的散列算法5Block Ciphers as Hash Functions can use block ciphers as hash functions using H0=0 and zero-pad of final block compute: Hi = EMi Hi-1 and use final block as the hash value similar to CBC but without a key resulting hash is too small (64-bit) both due to direct birthday attack and to “meet-i
7、n-the-middle” attack other variants also susceptible to attackCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法6Hash Algorithms similarities in the evolution of hash functions & block ciphers increasing power of brute-force attacks leading to evolution in algorithms from DES to
8、 AES in block ciphers from MD4 & MD5 to SHA-1 & RIPEMD-160 in hash algorithms likewise tend to use common iterative structure as do block ciphersCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法7MD5 designed by Ronald Rivest (the “R” in RSA) latest in a series of MD2, MD4 p
9、roduces a 128-bit hash value until recently was the most widely used hash algorithm in recent times have both brute-force & cryptanalytic concerns specified as Internet standard RFC1321CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法8MD5 Overviewpad message so its length is 44
10、8 mod 512 append a 64-bit length value to message initialise 4-word (128-bit) MD buffer (A,B,C,D) process message in 16-word (512-bit) blocks: using 4 rounds of 16 bit operations on message block & buffer add output to buffer input to form new buffer value output hash value is the final buffer v
11、alue CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法9MD5 OverviewCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法10MD5 Compression Function each round has 16 steps of the form: a = b+(a+g(b,c,d)+Xk+Ti)s) a,b,c,d refer to the 4 words of the buffer, but used in v
12、arying permutations note this updates 1 word only of the buffer after 16 steps each word is updated 4 times where g(b,c,d) is a different nonlinear function in each round (F,G,H,I) Ti is a constant value derived from sinCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法11MD5 Compres
13、sion FunctionCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法12MD4 precursor to MD5 also produces a 128-bit hash of message has 3 rounds of 16 steps versus 4 in MD5 design goals: collision resistant (hard to find collisions) direct security (no dependence on hard problems) fast, s
14、imple, compact favors little-endian systems (eg PCs) CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法13Strength of MD5 MD5 hash is dependent on all message bits Rivest claims security is good as can be known attacks are: Berson 92 attacked any 1 round using differential cryptanaly
15、sis (but cant extend) Boer & Bosselaers 93 found a pseudo collision (again unable to extend) Dobbertin 96 created collisions on MD compression function (but initial constants prevent exploit) conclusion is that MD5 looks vulnerable soonCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(
16、不同的散列算法14Secure HashAlgorithm (SHA-1) SHA was designed by NIST & NSA in 1993, revised 1995 as SHA-1 US standard for use with DSA signature scheme standard is FIPS 180-1 1995, also Internet RFC3174 note: the algorithm is SHA, the standard is SHS produces 160-bit hash values now the generally pref
17、erred hash algorithm based on design of MD4 with key differences CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法15SHA Overviewpad message so its length is 448 mod 512 append a 64-bit length value to messageinitialise 5-word (160-bit) buffer (A,B,C,D,E) to (67452301,efcdab89,98bad
18、cfe,10325476,c3d2e1f0) process message in 16-word (512-bit) chunks:expand 16 words into 80 words by mixing & shifting use 4 rounds of 20 bit operations on message block & buffer add output to input to form new buffer value output hash value is the final buffer value CryptographyandNetworkSec
19、urity(VariousHashAlgorithm密码学与网络安全(不同的散列算法16SHA-1 Compression Function each round has 20 steps which replaces the 5 buffer words thus:(A,B,C,D,E) -(E+f(t,B,C,D)+(A5)+Wt+Kt),A,(B30),C,D) a,b,c,d,e refer to the 5 words of the buffer t is the step number f(t,B,C,D) is nonlinear function for round Wt is
20、 derived from the message block Kt is a constant value derived from sinCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法17SHA-1 Compression FunctionCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法18SHA-1 verses MD5 brute force attack is harder (160 vs 128 bits fo
21、r MD5) not vulnerable to any known attacks (compared to MD4/5) a little slower than MD5 (80 vs 64 steps) both designed as simple and compact optimised for big endian CPUs (vs MD5 which is optimised for little endian CPUs) CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法19Revised S
22、ecure Hash Standard NIST has issued a revision FIPS 180-2 adds 3 additional hash algorithms SHA-256, SHA-384, SHA-512 designed for compatibility with increased security provided by the AES cipher structure & detail is similar to SHA-1 hence analysis should be similarCryptographyandNetworkSecurit
23、y(VariousHashAlgorithm密码学与网络安全(不同的散列算法20Keyed Hash Functions as MACs have desire to create a MAC using a hash function rather than a block cipher because hash functions are generally faster not limited by export controls unlike block ciphers hash includes a key along with the message original propos
24、al:KeyedHash = Hash(Key|Message) some weaknesses were found with this eventually led to development of HMAC CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法21HMAC specified as Internet standard RFC2104 uses hash function on the message:HMACK = Hash(K+ XOR opad) | Hash(K+ XOR ipad)|M) where K+ is the key padded out to size and opad, ipad are specified padding constants overhead is just 3 mor
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 广告预算审批合同
- 《高效搜索网络资料的技巧》课件
- 《抗病毒药物》课件2
- 《掌握课件制作的几个小技巧》教程
- 身体护理全能法宝让肌肤一直健康亮丽
- 保湿攻略让肌肤变得水当当
- 理解七夕节的爱情与亲情
- 幼儿在园安全心得体会模版
- 《NLP教练式管理》课件
- 为企业数据筑起坚实的保护墙-基于区块链的安全与信任方案
- 普及防癌知识宣传
- 【课件】时代与变革-为人生而艺术+课件高一上学期美术人美版(2019)必修美术鉴赏
- 第6课+呵护花季+激扬青春【中职专用】《心理健康与职业生涯规划》(高教版2023基础模块)
- 博士生入学复试面试报告个人简历介绍(完美版)模板两篇
- 康养旅游项目策划书
- 全套电子课件:基础会计(第五版)
- 超高频开关电源技术的前沿研究
- 精编中学生廉洁教育教案课件
- 安徽恒星新材料科技有限公司年产6万吨新型高品质电子级及多功能环氧树脂项目环评报告
- 光伏支架及组件安装施工方案(最终版)
- 220KV输电线路组塔施工方案
评论
0/150
提交评论