Cryptography and Network Security: Fifth Edition by William Stallings
Cryptography and Network Security: Fifth Edition by William Stallings
Network Security
Chapter 11
Fifth Edition
by William Stallings
Lecture slides by Lawrie Brown
Chapter 11 Cryptographic
Hash Functions
Each of the messages, like each one he had ever
read of Stern's commands, began with a number
and ended with a number or row of numbers. No
efforts on the part of Mungo or any of his experts
had been able to break Stern's code, nor was
there any clue as to what the preliminary
number and those ultimate numbers signified.
Talking to Strange Men, Ruth Rendell
Message Authentication
message encryption
message authentication code (MAC)
hash function
Security Requirements
disclosure
traffic
analysis
masquerade
content modification
sequence modification
timing modification
source repudiation
destination repudiation
4
Hash Functions
A
usually
Hash
Functions
& Message
Authentication
for
pseudorandom
function (PRF) or
pseudorandom number generator (PRNG)
one-bit
collision
resistance
hence
Birthday Attacks
attacks
resulting
other
designed
SHA Versions
SHA-1
Message
digest size
160
224
256
384
512
< 264
< 264
< 264
< 2128
< 2128
Block size
512
512
512
1024
1024
Word size
32
32
32
64
64
Number of
steps
80
64
64
80
80
Message
size
SHA-512 Overview
SHA-512 Compression
Function
heart
of the algorithm
processing message in 1024-bit blocks
consists of 80 rounds
SHA-3
SHA-1
SHA-2
NIST
SHA-3 Requirements
replace
preserve
evaluation
criteria
Summary
have
considered:
hash functions
uses, requirements, security