Hash Functions Cryptography Powerpoint Presentation Notes Security
Hash Functions Cryptography Powerpoint Presentation Notes Security
Network Security
Chapter 11
Fifth Edition
by William Stallings
Lecture slides by Lawrie Brown
Chapter 11 Cryptographic
Hash Functions
Each of the messages, like each one he had ever
read of Stern's commands, began with a number
and ended with a number or row of numbers. No
efforts on the part of Mungo or any of his experts
had been able to break Stern's code, nor was
there any clue as to what the preliminary number
and those ultimate numbers signified.
Talking to Strange Men, Ruth Rendell
Hash Functions
condenses arbitrary message to fixed size
h = H(M)
usually assume hash function is public
hash used to detect changes to message
want a cryptographic hash function
authenticate as Alice
collision resistance
Birthday Attacks
Birthday Attacks
Find i and j
such that
H(yj)=H(xi)
Table takes
O(N2) time
Faster
Sorted lists
take O(NlogN)
time
y1
y2
yj
yN
x
x1
x2
xi
xN
Birthday Attacks
What are chances we get a match?
N distinct values, k randomly chosen ones
N1/2
Need double # bits in hash value
SHA Versions
SHA-512 Overview
SHA-512 Compression
Function
heart of the algorithm
processing message in 1024-bit blocks
consists of 80 rounds
SHA-3
SHA-1 not yet "broken
SHA-3 Requirements
replace SHA-2 with SHA-3 in any use
evaluation criteria
Summary
have considered:
hash functions
uses, requirements, security