版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
CryptographyandNetworkSecurity
(VariousHashAlgorithms)FourthEditionbyWilliamStallingsLectureslidesbyLawrieBrown(ChangedbySomeshJha)1BirthdayAttacksmightthinka64-bithashissecurebutbyBirthdayParadoxisnotbirthdayattackworksthus:opponentgenerates2m/2
variationsofavalidmessageallwithessentiallythesamemeaningopponentalsogenerates2m/2variationsofadesiredfraudulentmessagetwosetsofmessagesarecomparedtofindpairwithsamehash(probability>0.5bybirthdayparadox)haveusersignthevalidmessage,thensubstitutetheforgerywhichwillhaveavalidsignatureconclusionisthatneedtouselargerMACs2HashFunctionPropertiesaHashFunctionproducesafingerprintofsomefile/message/data
h=H(M)condensesavariable-lengthmessageMtoafixed-sizedfingerprintassumedtobepublic3RequirementsforHashFunctionscanbeappliedtoanysizedmessageMproducesfixed-lengthoutputhiseasytocomputeh=H(M)foranymessageMgivenhisinfeasibletofindx
s.t.H(x)=hone-waypropertygivenxisinfeasibletofindy
s.t.H(y)=H(x)weakcollisionresistanceisinfeasibletofindanyx,y
s.t.H(y)=H(x)strongcollisionresistance4BlockCiphersasHashFunctionscanuseblockciphersashashfunctionsusingH0=0andzero-padoffinalblockcompute:Hi=EMi[Hi-1]andusefinalblockasthehashvaluesimilartoCBCbutwithoutakeyresultinghashistoosmall(64-bit)bothduetodirectbirthdayattackandto“meet-in-the-middle〞attackothervariantsalsosusceptibletoattack5HashAlgorithmssimilaritiesintheevolutionofhashfunctions&blockciphersincreasingpowerofbrute-forceattacksleadingtoevolutioninalgorithmsfromDEStoAESinblockciphersfromMD4&MD5toSHA-1&RIPEMD-160inhashalgorithmslikewisetendtousecommoniterativestructureasdoblockciphers6MD5designedbyRonaldRivest(the“R〞inRSA)latestinaseriesofMD2,MD4producesa128-bithashvalueuntilrecentlywasthemostwidelyusedhashalgorithminrecenttimeshavebothbrute-force&cryptanalyticconcernsspecifiedasInternetstandardRFC13217MD5Overviewpadmessagesoitslengthis448mod512appenda64-bitlengthvaluetomessageinitialise4-word(128-bit)MDbuffer(A,B,C,D)processmessagein16-word(512-bit)blocks:using4roundsof16bitoperationsonmessageblock&bufferaddoutputtobufferinputtoformnewbuffervalueoutputhashvalueisthefinalbuffervalue8MD5Overview9MD5CompressionFunctioneachroundhas16stepsoftheform:a=b+((a+g(b,c,d)+X[k]+T[i])<<<s)a,b,c,drefertothe4wordsofthebuffer,butusedinvaryingpermutationsnotethisupdates1wordonlyofthebufferafter16stepseachwordisupdated4timeswhereg(b,c,d)isadifferentnonlinearfunctionineachround(F,G,H,I)T[i]isaconstantvaluederivedfromsin10MD5CompressionFunction11MD4precursortoMD5alsoproducesa128-bithashofmessagehas3roundsof16stepsversus4inMD5designgoals:collisionresistant(hardtofindcollisions)directsecurity(nodependenceon"hard"problems)fast,simple,compactfavorslittle-endiansystems(egPCs)12StrengthofMD5MD5hashisdependentonallmessagebitsRivestclaimssecurityisgoodascanbeknownattacksare:Berson92attackedany1roundusingdifferentialcryptanalysis(butcan’textend)Boer&Bosselaers93foundapseudocollision(againunabletoextend)Dobbertin96createdcollisionsonMDcompressionfunction(butinitialconstantspreventexploit)conclusionisthatMD5looksvulnerablesoon13SecureHash
Algorithm(SHA-1)SHAwasdesignedbyNIST&NSAin1993,revised1995asSHA-1USstandardforusewithDSAsignatureschemestandardisFIPS180-11995,alsoInternetRFC3174note:thealgorithmisSHA,thestandardisSHSproduces160-bithashvaluesnowthegenerallypreferredhashalgorithmbasedondesignofMD4withkeydifferences14SHAOverviewpadmessagesoitslengthis448mod512appenda64-bitlengthvaluetomessageinitialise5-word(160-bit)buffer(A,B,C,D,E)to(67452301,efcdab89,98badcfe,10325476,c3d2e1f0)processmessagein16-word(512-bit)chunks:expand16wordsinto80wordsbymixing&shiftinguse4roundsof20bitoperationsonmessageblock&bufferaddoutputtoinputtoformnewbuffervalueoutputhashvalueisthefinalbuffervalue15SHA-1CompressionFunctioneachroundhas20stepswhichreplacesthe5bufferwordsthus:(A,B,C,D,E)<-(E+f(t,B,C,D)+(A<<5)+Wt+Kt),A,(B<<30),C,D)a,b,c,d,erefertothe5wordsofthebuffertisthestepnumberf(t,B,C,D)isnonlinearfunctionforroundWtisderivedfromthemessageblockKtisaconstantvaluederivedfromsin16SHA-1CompressionFunction17SHA-1versesMD5bruteforceattackisharder(160vs128bitsforMD5)notvulnerabletoanyknownattacks(comparedtoMD4/5)alittleslowerthanMD5(80vs64steps)bothdesignedassimpleandcompactoptimisedforbigendianCPU's(vsMD5whichisoptimisedforlittleendianCPU’s)18RevisedSecureHashStandardNISThasissuedarevisionFIPS180-2adds3additionalhashalgorithmsSHA-256,SHA-384,SHA-512designedforcompatibilitywithincreasedsecurityprovidedbytheAEScipherstructure&detailissimilartoSHA-1henceanalysisshouldbesimilar19KeyedHashFunctionsasMACshavedesiretocreateaMACusingahashfunctionratherthanablockcipherbecausehashfunctionsaregenerallyfasternotlimitedbyexportcontrolsunlikeblockciphershashincludesakeyalongwiththemessageoriginalproposal:KeyedHash=Hash(Key|Message)someweaknesseswerefoundwiththiseventuallyledtodevelopmentofHMAC20HMACspecifiedasInternetstandardRFC2104useshashfunctiononthemessage:HMACK=Hash[(K+XORopad)|| Hash[(K+XORipad)||M)]]whereK
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年中职汽车美容与装潢(内饰清洁)试题及答案
- 2025年高职智能设备运行与维护(故障诊断)试题及答案
- 2026年农业机械化及其自动化(农机自动化)考题及答案
- 2026年营销发展(模式创新)考题及答案
- 2026年湖南单招职业技能案例分析简答题含答案主观题专项
- 2026年浙江单招志愿填报冲稳保配套模拟试卷含答案按录取概率分层
- 2025-2026学年度湖北省随州市、孝感市部分学校高一上学期12月月考历史试题(含答案)
- 2025浙江头门港港务有限公司招聘笔试参考题库附带答案详解(3卷)
- 乡村振兴医疗志愿服务品牌深耕策略
- 雅安市2023下半年四川雅安市综合类事业单位招聘笔试提示笔试历年参考题库典型考点附带答案详解(3卷合一)
- 信任价格关系研究-洞察与解读
- 四大名著经典讲解课件
- (北师大2024版)生物八上全册知识点(默写版+背诵版)
- 陌陌聊天话术技巧
- 精神科常见药物不良反应
- 2025年小学必读书目《窗边的小豆豆》阅读测试试题及答案
- 铝合金车身轻量化技术-洞察与解读
- 2025江苏盐城市水务集团有限公司招聘专业人员34人笔试题库历年考点版附带答案详解
- 学堂在线 雨课堂 学堂云 实验室安全密码 章节测试答案
- 华为培训心得体会
- 大一期末c语言考试真题及答案
评论
0/150
提交评论