CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法课件_第1页
CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法课件_第2页
CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法课件_第3页
CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法课件_第4页
CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法课件_第5页
已阅读5页,还剩20页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法1Cryptography and Network Security(Various Hash Algorithms)Fourth Editionby William StallingsLecture slides by Lawrie Brown(Changed by Somesh Jha)CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法2Birthday Attacks mi

2、ght think a 64-bit hash is secure but by Birthday Paradox is not birthday attack works thus: opponent generates 2m/2 variations of a valid message all with essentially the same meaning opponent also generates 2m/2 variations of a desired fraudulent message two sets of messages are compared to find p

3、air with same hash (probability 0.5 by birthday paradox) have user sign the valid message, then substitute the forgery which will have a valid signature conclusion is that need to use larger MACsCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法3Hash Function Properties a Hash Funct

4、ion produces a fingerprint of some h = H(M) condenses a variable-length message M to a fixed-sized fingerprint assumed to be publicCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法4Requirements for Hash Functionscan be applied to any sized message Mproduces fixed-length output his

5、easy to compute h=H(M) for any message Mgiven h is infeasible to find x s.t. H(x)=hone-way propertygiven x is infeasible to find y s.t. H(y)=H(x)weak collision resistanceis infeasible to find any x,y s.t. H(y)=H(x)strong collision resistanceCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全

6、(不同的散列算法5Block Ciphers as Hash Functions can use block ciphers as hash functions using H0=0 and zero-pad of final block compute: Hi = EMi Hi-1 and use final block as the hash value similar to CBC but without a key resulting hash is too small (64-bit) both due to direct birthday attack and to “meet-i

7、n-the-middle” attack other variants also susceptible to attackCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法6Hash Algorithms similarities in the evolution of hash functions & block ciphers increasing power of brute-force attacks leading to evolution in algorithms from DES to

8、 AES in block ciphers from MD4 & MD5 to SHA-1 & RIPEMD-160 in hash algorithms likewise tend to use common iterative structure as do block ciphersCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法7MD5 designed by Ronald Rivest (the “R” in RSA) latest in a series of MD2, MD4 p

9、roduces a 128-bit hash value until recently was the most widely used hash algorithm in recent times have both brute-force & cryptanalytic concerns specified as Internet standard RFC1321CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法8MD5 Overviewpad message so its length is 44

10、8 mod 512 append a 64-bit length value to message initialise 4-word (128-bit) MD buffer (A,B,C,D) process message in 16-word (512-bit) blocks: using 4 rounds of 16 bit operations on message block & buffer add output to buffer input to form new buffer value output hash value is the final buffer v

11、alue CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法9MD5 OverviewCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法10MD5 Compression Function each round has 16 steps of the form: a = b+(a+g(b,c,d)+Xk+Ti)s) a,b,c,d refer to the 4 words of the buffer, but used in v

12、arying permutations note this updates 1 word only of the buffer after 16 steps each word is updated 4 times where g(b,c,d) is a different nonlinear function in each round (F,G,H,I) Ti is a constant value derived from sinCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法11MD5 Compres

13、sion FunctionCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法12MD4 precursor to MD5 also produces a 128-bit hash of message has 3 rounds of 16 steps versus 4 in MD5 design goals: collision resistant (hard to find collisions) direct security (no dependence on hard problems) fast, s

14、imple, compact favors little-endian systems (eg PCs) CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法13Strength of MD5 MD5 hash is dependent on all message bits Rivest claims security is good as can be known attacks are: Berson 92 attacked any 1 round using differential cryptanaly

15、sis (but cant extend) Boer & Bosselaers 93 found a pseudo collision (again unable to extend) Dobbertin 96 created collisions on MD compression function (but initial constants prevent exploit) conclusion is that MD5 looks vulnerable soonCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(

16、不同的散列算法14Secure HashAlgorithm (SHA-1) SHA was designed by NIST & NSA in 1993, revised 1995 as SHA-1 US standard for use with DSA signature scheme standard is FIPS 180-1 1995, also Internet RFC3174 note: the algorithm is SHA, the standard is SHS produces 160-bit hash values now the generally pref

17、erred hash algorithm based on design of MD4 with key differences CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法15SHA Overviewpad message so its length is 448 mod 512 append a 64-bit length value to messageinitialise 5-word (160-bit) buffer (A,B,C,D,E) to (67452301,efcdab89,98bad

18、cfe,10325476,c3d2e1f0) process message in 16-word (512-bit) chunks:expand 16 words into 80 words by mixing & shifting use 4 rounds of 20 bit operations on message block & buffer add output to input to form new buffer value output hash value is the final buffer value CryptographyandNetworkSec

19、urity(VariousHashAlgorithm密码学与网络安全(不同的散列算法16SHA-1 Compression Function each round has 20 steps which replaces the 5 buffer words thus:(A,B,C,D,E) -(E+f(t,B,C,D)+(A5)+Wt+Kt),A,(B30),C,D) a,b,c,d,e refer to the 5 words of the buffer t is the step number f(t,B,C,D) is nonlinear function for round Wt is

20、 derived from the message block Kt is a constant value derived from sinCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法17SHA-1 Compression FunctionCryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法18SHA-1 verses MD5 brute force attack is harder (160 vs 128 bits fo

21、r MD5) not vulnerable to any known attacks (compared to MD4/5) a little slower than MD5 (80 vs 64 steps) both designed as simple and compact optimised for big endian CPUs (vs MD5 which is optimised for little endian CPUs) CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法19Revised S

22、ecure Hash Standard NIST has issued a revision FIPS 180-2 adds 3 additional hash algorithms SHA-256, SHA-384, SHA-512 designed for compatibility with increased security provided by the AES cipher structure & detail is similar to SHA-1 hence analysis should be similarCryptographyandNetworkSecurit

23、y(VariousHashAlgorithm密码学与网络安全(不同的散列算法20Keyed Hash Functions as MACs have desire to create a MAC using a hash function rather than a block cipher because hash functions are generally faster not limited by export controls unlike block ciphers hash includes a key along with the message original propos

24、al:KeyedHash = Hash(Key|Message) some weaknesses were found with this eventually led to development of HMAC CryptographyandNetworkSecurity(VariousHashAlgorithm密码学与网络安全(不同的散列算法21HMAC specified as Internet standard RFC2104 uses hash function on the message:HMACK = Hash(K+ XOR opad) | Hash(K+ XOR ipad)|M) where K+ is the key padded out to size and opad, ipad are specified padding constants overhead is just 3 mor

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论