Class 4
Class 4
• Project 1
Yao Zhao
Introduction of GnuPG
• GnuPG Stands for GNU Privacy Guard
• A tool for secure communication and data
storage
• To encrypt data and create digital
signatures
• Using public-key cryptography
• Distributed in almost every Linux
• For T-lab machines --- gpg command
Functionality of GnuPG
• Generating a new keypair
– gpg -- gen-key
• Key type
– (1) DSA and ElGamal (default)
• Key size
– DSA: between 512 and 1024 bits->1024 bits
• Detached signatures
– gpg --output doc.sig --detach-sig doc
– gpg --verify doc.sig doc
Questions?
Outline
• Project 1
• Change of class time on 1/30: 4:30-
5:50pm ?
ABCD=fF(ABCD,mi,T[1..16])
A B C D
ABCD=fG(ABCD,mi,T[17..32])
ABCD=fH(ABCD,mi,T[33..48])
ABCD=fI(ABCD,mi,T[49..64])
+ + + +
MD i+1
Padding Twist
• Given original message M, add padding
bits “10*” such that resulting length is 64
bits less than a multiple of 512 bits.
• Append (original length in bits mod 264),
represented in 64 bits to the padded
message
• Final message is chopped 512 bits a block
MD5 Process
• As many stages as the number of 512-bit
blocks in the final padded message
• Digest: 4 32-bit words: MD=A|B|C|D
• Every message block contains 16 32-bit
words: m0|m1|m2…|m15
– Digest MD0 initialized to:
A=01234567,B=89abcdef,C=fedcba98,
D=76543210
– Every stage consists of 4 passes over the
message block, each modifying MD
• Each block 4 rounds, each round 16 steps
Different Passes...
Each step i (1 <= i <= 64):
• Input:
– mi – a 32-bit word from the message
With different shift every round
– Ti – int(232 * abs(sin(i)))
Provided a randomized set of 32-bit patterns, which
eliminate any regularities in the input data
– ABCD: current MD
• Output:
– ABCD: new MD
MD5 Compression Function
• Each round has 16 steps of the form:
a = b+((a+g(b,c,d)+X[k]+T[i])<<<s)
• a,b,c,d refer to the 4 words of the buffer,
but used in varying permutations
– note this updates 1 word only of the buffer
– after 16 steps each word is updated 4 times
• where g(b,c,d) is a different nonlinear
function in each round (F,G,H,I)
MD5 Compression Function
Functions and Random
Numbers
• F(x,y,z) == (xy)(~x z)
– selection function
• G(x,y,z) == (x z) (y ~ z)
• H(x,y,z) == xy z
• I(x,y,z) == y(x ~z)
Secure Hash Algorithm
• Developed by NIST, specified in the Secure
Hash Standard (SHS, FIPS Pub 180), 1993
• SHA is specified as the hash algorithm in
the Digital Signature Standard (DSS), NIST
General Logic
• Input message must be < 264 bits
– not really a problem
• Message is processed in 512-bit blocks
sequentially
• Message digest is 160 bits
• SHA design is similar to MD5, a little
slower, but a lot stronger
Basic Steps
Step1: Padding
Step2: Appending length as 64 bit unsigned
Step3: Initialize MD buffer 5 32-bit words
Store in big endian format, most significant bit in low
address
A|B|C|D|E
A = 67452301
B = efcdab89
C = 98badcfe
D = 10325476
E = c3d2e1f0
Basic Steps...
Step 4: the 80-step processing of 512-bit
blocks – 4 rounds, 20 steps each.
Each step t (0 <= t <= 79):
– Input:
• Wt – a 32-bit word from the message
• Kt – a constant.
– Output:
• ABCDE: new MD.
SHA-1 verses MD5
• Brute force attack is harder (160 vs 128 bits
for MD5)
• A little slower than MD5 (80 vs 64 steps)
– Both work well on a 32-bit architecture
• Both designed as simple and compact for
implementation
• Cryptanalytic attacks
– MD4/5: vulnerability discovered since its design
– SHA-1: no until recent 2005 results raised concerns
on its use in future applications
Revised Secure Hash Standard
• NIST have issued a revision FIPS 180-2 in
2002
• Adds 3 additional hash algorithms
• SHA-256, SHA-384, SHA-512
– Collectively called SHA-2
• Designed for compatibility with increased
security provided by the AES cipher
• Structure & detail are similar to SHA-1
• Hence analysis should be similar, but security
levels are rather higher