Cryptographic Hash Functions message auhentication

nagwaAboElenein 27 views 24 slides Oct 06, 2024
Slide 1
Slide 1 of 24
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24

About This Presentation

Cryptographic Hash Functions


Slide Content

McGraw-Hill ©TheMcGraw-HillCompanies,Inc.,
15.1
Copyright©TheMcGraw-HillCompanies,Inc.Permissionrequiredforreproductionordisplay.
Chapter 11
Message Integrity,MessageAuthentication
And Hash Functions

Cryptographic Hash Functions
Key Points
•Hash function Variable-length message
Fixed-length message digest
h=H(M)
•Cryptographic hash functions iterative use
of a compression function

Introduction
When hash function provides security, this is called cryptographic hash functions.
Hash function protects the integrity of the message. If encryption process is
applying on message with hash function, it is also providing authentication and
confidentiality
A hash function provides a property that has function applied on variable amount
of data (M) and then it produces the fixed amount of output data. If any bit or bits
changes in the data, then whole hash function output data will also change.
Cryptographic has function is one-way function, which is practically infeasible to
invert. The most popular hashing algorithm is MD5 and SHA.
l,

Cryptographic Hash Functions
•Hash function
One-way property
Collision-free property
H
“Hash function”
M H(M)
Data Integrity
Computationally infeasible

Cryptographic Hash Functions
Block diagram

Properties of hash Function
Compression: As per compression properties, output of the hash function is much smaller
than the size of input.
Pre-image resistance: Pre-image resistance means difficult to find the input from given
hash function output. i.e., x=H(m). So if x is given, it is difficult to message m.
Weak Collision Resistance: Given message m1, weak collision resistance means that it is
difficult to produce another message m2 such that H(m1)=H(m2). i.e, it means it is
infeasible to find two different messages with the same hash value.
Strong Collision Resistance: Strong collision resistance means that is difficult to find any
two different messages that hash to the same value. i.e., it means it is hard to find m1 &
m2 such that same hash value H(m1) = H(m2)

Cryptographic Hash Functions
Applications
1.Message Authentication
2.Digital Signatures
3.Other Applications (Internet protocols)

Cryptographic Hash Functions
Message Authentication
•Message authentication
Mechanism or service used to verify the
integrity of a message.
No modification
No insertion
No deletion
No replay

Cryptographic Hash Functions
Message Authentication
Confidentiality
No
Confidentiality

Cryptographic Hash Functions
Message Authentication
Confidentiality

Cryptographic Hash Functions
Message Authentication
•No confidentiality: method (b) has an
advantage over methods (a) and (d)
less computation
•Avoid encryption method (c)
Encryption software relatively slow
Encryption hardware high cost
Time high
Encryption algorithms patents cost

Cryptographic Hash Functions
Message Authentication
M: variable-length message
K:secret key K
Output: fixed-size
MAC:message authentication code (keyed hash function)

Cryptographic Hash Functions
Digital Signatures
Public key
H
“Hash
function”
M H(M)
Encryption
algorithm
Private
key

Cryptographic Hash Functions
Digital Signatures

Cryptographic Hash Functions
Digital Signatures
•Digital signature private-key-
encrypted hash code authentication
(only the sender could have produced the
encrypted hash code, essence of the digital
signature technique)
•Confidentiality + Digital signature
message + private-key-encrypted hash code
encrypted using a symmetric secret key

Cryptographic Hash Functions
Other Applications
1.One-way password file
2.Intrusion detection
3.Virus detection
4.Pseudorandom function(PRF) or a
Pseudorandom number generator
(PRNG).

Cryptographic Hash Functions
Two Simple Hash Functions
1.Bit-by-Bit exclusive-OR (XOR) of every block

Cryptographic Hash Functions
Requirements and Security

Cryptographic Hash Functions
Secure Hash Algorithm(SHA)
•National Institute of Standards and
Technology (NIST)-Federal information
processing standard (FIPS 180)-1993
SHA-0 (1993)
SHA-1 (1995)
SHA-256
SHA-384 (2002)
SHA-512

Cryptographic Hash Functions
Secure Hash Algorithm(SHA)

Cryptographic Hash Functions
SHA-512 Logic

Cryptographic Hash Functions
SHA-512 Round Function

Thank you for your
attention
Tags