Fourth Edition by William Stallings
Fourth Edition by William Stallings
|
Fourth Edition
by William Stallings
|
|
!
Æ
|
ash Functions
" condense arbitrary size message to
fixed size
" by processing message in blocks
" through some compression function
" either custom or block cipher based
Message Authentication Code (MAC)
" fixed sized authenticator for some
message
" to provide authentication for message
" by using block cipher mode or hash
function
SA originally designed by NIST & NSA in
1993
was revised in 1995 as SA-1
US standard for use with DSA signature
scheme
" standard is FIPS 180-1 1995, also Internet
RFC3174
" nb. the algorithm is SA, the standard is SS
based on design of MD4 with key
differences
produces 160-bit hash values
recent 2005 results on security of SA-1
have raised concerns on its use in future
Ý
w
where K+ is the key padded out to size
and opad, ipad are specified padding
constants
overhead is just 3 more hash calculations
than the message needs alone
any hash function can be used
" eg. MD5, SA-1, RIPEMD-160, Whirlpool
|
|
proved security of MAC relates to
that of the underlying hash
algorithm
attacking MAC requires either:
" brute force attack on key used
" birthday attack (but since keyed would
need to observe a very large number of
messages)
choose hash function used based on
speed verses security constraints
||
have considered:
" some current hash algorithms
SA-512 & Whirlpool
" MAC authentication using hash
function
" CMAC authentication using a block
cipher