CRYPTOGRAPHIC HASHFUNCTIONSB A S E D O N S TA L L I N G S & C A R B U N A RR I C K B L A Z E K , P H D .
MESSAGE AUTHENTICATIONAS A COUNTERMEASURE•Disclosure•Traffic analysis–Discovery of the pattern oftraffic between parties•Masquerade•Content modification•Sequence modification•Timing modification•Source repudiation•Destination repudiation2UseEncryptionUseAuthenticationDigital Signature
HASH FUNCTIONUSES3•MessageIntegrity/Authentication Check [MAC]•Message OriginCheck [Signature]•Combined withencryption
OTHER HASH FUNCTION USESCommonly used tocreate a one-waypassword fileWhen a user enters apassword, the hashof that password iscompared to thestored hash value forverificationThis approach topassword protectionis used by mostoperating systemsCan be used toconstruct apseudorandomfunction [PRF] or apseudorandomnumber generator[PRNG]A commonapplication for ahash-based PRF isfor the generation ofsymmetric keys4H[salt, pwd]
HASH FUNCTIONSA hash function Haccepts a variable-length block of dataMas input and producesa fixed-size hash value–h =H[M]–Principal object isdata integrity6How is the sizereduced ?
HASH FUNCTION•Hash function H is a lossy compression function•Repeated Compression using Block Chaining•Avoid Collision: H[x]=H[x’] for some inputs x≠x’•H[x] should look “random”•Cryptographic hash function–An algorithm for which it is computationally infeasible to findeither:•[a] a data object that maps to a pre-specified hash result [theone-way property]•[b] two data objects that map to the same hash result [thecollision-free property]7
Figure11.2Attack Against Hash Function[b] Man-in-the-middleattackAliceDarthBobBobAliceCOMPAREdata8Does notprotect againstMITM
EKMH| |DKMH[M]HCompare[a]E[K, [M|| H[M]]]Destination BSource A9M + HEncrypted wSymmetric KeyE[K, H[M]]
MESSAGEAUTHENTICATIONCODE [MAC]•Also known as a keyed hash function•Typically used between two parties that share a secretkey to authenticate information exchanged between11Takes as input a secret key and a data block andproduces a hash value [MAC] which is associatedwith the protected message•If the integrity of the message needs to bechecked, the MAC function can be applied to themessage and the result compared with theassociated MAC value•An attacker who alters the message will beunable to alter the associated MAC value withoutknowledge of the secret key
EXAMPLE MD5 &SHA112md5_digest["The quick brown fox jumps over the lazydog"] =9e107d9d372bb6826bd81d3542a419d6md5_digest["The quick brown fox jumps over the lazycog"] =1055d3e698d289f2af8663725127bd4bsha1_digest["The quick brown fox jumps over the lazydog”] =2fd4e1c67a2d28fced849ee1bb76e7391b93eb12sha1_digest["The quick brown fox jumps over the lazycog”] =de9f2c7fd25e1b3afad3e85a0bd17d9b100db4b3
MESSAGEAUTHENTICATIONFUNCTIONS•Two levels offunctionality:–Hash function–
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 36 pages?
Upload your study docs or become a
Course Hero member to access this document
Tags
Cryptographic hash function