




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法1Cryptography and Network Security(Various Hash Algorithms)Fourth Editionby William StallingsLecture slides by Lawrie Brown(Changed by Somesh Jha)CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法2Birthday Attacks mi
2、ght think a 64-bit hash is secure but by Birthday Paradox is not birthday attack works thus: opponent generates 2m/2 variations of a valid message all with essentially the same meaning opponent also generates 2m/2 variations of a desired fraudulent message two sets of messages are compared to find p
3、air with same hash (probability 0.5 by birthday paradox) have user sign the valid message, then substitute the forgery which will have a valid signature conclusion is that need to use larger MACsCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法3Hash Function Properties a Hash Funct
4、ion produces a fingerprint of some h = H(M) condenses a variable-length message M to a fixed-sized fingerprint assumed to be publicCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法4Requirements for Hash Functionscan be applied to any sized message Mproduces fixed-length output his
5、easy to compute h=H(M) for any message Mgiven h is infeasible to find x s.t. H(x)=hone-way propertygiven x is infeasible to find y s.t. H(y)=H(x)weak collision resistanceis infeasible to find any x,y s.t. H(y)=H(x)strong collision resistanceCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全
6、(不同的散列算法5Block Ciphers as Hash Functions can use block ciphers as hash functions using H0=0 and zero-pad of final block compute: Hi = EMi Hi-1 and use final block as the hash value similar to CBC but without a key resulting hash is too small (64-bit) both due to direct birthday attack and to “meet-i
7、n-the-middle” attack other variants also susceptible to attackCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法6Hash Algorithms similarities in the evolution of hash functions & block ciphers increasing power of brute-force attacks leading to evolution in algorithms from DES to
8、 AES in block ciphers from MD4 & MD5 to SHA-1 & RIPEMD-160 in hash algorithms likewise tend to use common iterative structure as do block ciphersCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法7MD5 designed by Ronald Rivest (the “R” in RSA) latest in a series of MD2, MD4 p
9、roduces a 128-bit hash value until recently was the most widely used hash algorithm in recent times have both brute-force & cryptanalytic concerns specified as Internet standard RFC1321CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法8MD5 Overviewpad message so its length is 44
10、8 mod 512 append a 64-bit length value to message initialise 4-word (128-bit) MD buffer (A,B,C,D) process message in 16-word (512-bit) blocks: using 4 rounds of 16 bit operations on message block & buffer add output to buffer input to form new buffer value output hash value is the final buffer v
11、alue CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法9MD5 OverviewCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法10MD5 Compression Function each round has 16 steps of the form: a = b+(a+g(b,c,d)+Xk+Ti)s) a,b,c,d refer to the 4 words of the buffer, but used in v
12、arying permutations note this updates 1 word only of the buffer after 16 steps each word is updated 4 times where g(b,c,d) is a different nonlinear function in each round (F,G,H,I) Ti is a constant value derived from sinCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法11MD5 Compres
13、sion FunctionCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法12MD4 precursor to MD5 also produces a 128-bit hash of message has 3 rounds of 16 steps versus 4 in MD5 design goals: collision resistant (hard to find collisions) direct security (no dependence on hard problems) fast, s
14、imple, compact favors little-endian systems (eg PCs) CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法13Strength of MD5 MD5 hash is dependent on all message bits Rivest claims security is good as can be known attacks are: Berson 92 attacked any 1 round using differential cryptanaly
15、sis (but cant extend) Boer & Bosselaers 93 found a pseudo collision (again unable to extend) Dobbertin 96 created collisions on MD compression function (but initial constants prevent exploit) conclusion is that MD5 looks vulnerable soonCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(
16、不同的散列算法14Secure HashAlgorithm (SHA-1) SHA was designed by NIST & NSA in 1993, revised 1995 as SHA-1 US standard for use with DSA signature scheme standard is FIPS 180-1 1995, also Internet RFC3174 note: the algorithm is SHA, the standard is SHS produces 160-bit hash values now the generally pref
17、erred hash algorithm based on design of MD4 with key differences CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法15SHA Overviewpad message so its length is 448 mod 512 append a 64-bit length value to messageinitialise 5-word (160-bit) buffer (A,B,C,D,E) to (67452301,efcdab89,98bad
18、cfe,10325476,c3d2e1f0) process message in 16-word (512-bit) chunks:expand 16 words into 80 words by mixing & shifting use 4 rounds of 20 bit operations on message block & buffer add output to input to form new buffer value output hash value is the final buffer value CryptographyandNetworkSec
19、urity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法16SHA-1 Compression Function each round has 20 steps which replaces the 5 buffer words thus:(A,B,C,D,E) -(E+f(t,B,C,D)+(A5)+Wt+Kt),A,(B30),C,D) a,b,c,d,e refer to the 5 words of the buffer t is the step number f(t,B,C,D) is nonlinear function for round Wt is
20、 derived from the message block Kt is a constant value derived from sinCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法17SHA-1 Compression FunctionCryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法18SHA-1 verses MD5 brute force attack is harder (160 vs 128 bits fo
21、r MD5) not vulnerable to any known attacks (compared to MD4/5) a little slower than MD5 (80 vs 64 steps) both designed as simple and compact optimised for big endian CPUs (vs MD5 which is optimised for little endian CPUs) CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法19Revised S
22、ecure Hash Standard NIST has issued a revision FIPS 180-2 adds 3 additional hash algorithms SHA-256, SHA-384, SHA-512 designed for compatibility with increased security provided by the AES cipher structure & detail is similar to SHA-1 hence analysis should be similarCryptographyandNetworkSecurit
23、y(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法20Keyed Hash Functions as MACs have desire to create a MAC using a hash function rather than a block cipher because hash functions are generally faster not limited by export controls unlike block ciphers hash includes a key along with the message original propos
24、al:KeyedHash = Hash(Key|Message) some weaknesses were found with this eventually led to development of HMAC CryptographyandNetworkSecurity(VariousHashAlgorithm密碼學(xué)與網(wǎng)絡(luò)安全(不同的散列算法21HMAC specified as Internet standard RFC2104 uses hash function on the message:HMACK = Hash(K+ XOR opad) | Hash(K+ XOR ipad)|M) where K+ is the key padded out to size and opad, ipad are specified padding constants overhead is just 3 mor
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 餐飲工人合同協(xié)議書(shū)
- 書(shū)籍設(shè)計(jì)合同協(xié)議書(shū)
- 海外旅行急救包租賃及國(guó)際醫(yī)療援助及全球救援及理賠服務(wù)合同
- 網(wǎng)絡(luò)直播流量分成與移動(dòng)運(yùn)營(yíng)商合作合同
- 羽毛球比賽場(chǎng)地租賃合同
- 知識(shí)產(chǎn)權(quán)專(zhuān)利池投資合作合同
- 亞洲武術(shù)賽事轉(zhuǎn)播權(quán)與武術(shù)文化推廣合同
- 全球化供應(yīng)鏈管理中的清關(guān)與代理服務(wù)合同
- 高效節(jié)能溫室建設(shè)與智能控制系統(tǒng)合同
- 高品質(zhì)實(shí)木地板坯料定點(diǎn)采購(gòu)環(huán)保檢測(cè)及認(rèn)證合同
- 投顧服務(wù)方案
- 工程師轉(zhuǎn)正匯報(bào)課件
- 養(yǎng)殖場(chǎng)安全生產(chǎn)培訓(xùn)
- 語(yǔ)法知識(shí)-2022-2023學(xué)年八年級(jí)語(yǔ)文上學(xué)期期中考前復(fù)習(xí)訓(xùn)練(解析版)
- 水利工程中的水環(huán)境保護(hù)與生態(tài)修復(fù)
- 礦山生產(chǎn)管理培訓(xùn)課件
- 普及防癌知識(shí)宣傳
- 高一數(shù)學(xué)組尖子生培養(yǎng)計(jì)劃(修改)
- 醫(yī)療器械輻射安全管理的要求
- 自動(dòng)按頻率減負(fù)荷裝置
- 【課件】時(shí)代與變革-為人生而藝術(shù)+課件高一上學(xué)期美術(shù)人美版(2019)必修美術(shù)鑒賞
評(píng)論
0/150
提交評(píng)論