Optimizing computation of Hash-Algorithms as an attacker. Version
|
|
|
- Noel Ward
- 9 years ago
- Views:
Transcription
1 Optimizing computation of Hash-Algorithms as an attacker Version
2 Name: Nick: Jens Steube atom About me Coding Projects: hashcat / oclhashcat Work Status: Employed as Coder, not crypto- or security-relevant Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 2
3 In the context of password guessing the computation of hash-algorithms can be optimized so that an attacker needs less work to do then a defender. The reason is that hash-algorithms typically are not designed to protect passwords - but developers use them to do it since decades. This situation leads to optimizations that are possible for an attacker that the autors of the hash-algorithms never tried to avoid. Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 3
4 General Techniques Overview Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 4
5 General Techniques Technique Zero-based optimizations Early-exit optimizations Initial-step optimizations Precomputing Reversing aka Meet-in-the-middle NOTE Some of the techniques in these slide are known, some are not All of them are used in oclhashcat-lite Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 5
6 Zero-based optimizations General Techniques Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 6
7 From computers view, passwords are just numbers The password 'password' takes two 32-bit integers : f7264 password Zero-based optimizations It is copied to the algorithms input data block Typically fixed 512-bit, padded with zeros : f password : : : The above buffer shows the w[] array build out of the 16 elements Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 7
8 The password 'password' only took w[0] and w[1] to be populated, the rest are zero Zero-based optimizations : f password : : : This is how a single step function from the MD4 F() is calculated: #define FF(a,b,c,d,x,s) a += F (b, c, d) + x;... The function is called 16 times, each call using a different element of the input vector Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 8
9 #define FF(a,b,c,d,x,s) a += F (b, c, d) + x;... Zero-based optimizations If x is 0 then there is no change in that last addition If the password only has the length 8, we know that w[2] - w[15] are zero For all function calls that use w[2] - w[15] we can remove the addition completely Note that most algorithms fill w[14] or w[15] in final() Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 9
10 Conclusion Zero-based optimizations NOTE In MD4, this saves (on passwords < length 12) a total of 36 / 128 ADD instructions In MD5, this saves (on passwords < length 12) a total of x / 128 ADD instructions TBD, add more hash-algorithms AFAIK, this technique works on all raw hashing algorithms HMAC defeats this Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 10
11 Initial-step optimizations General Techniques Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 11
12 Here is a snippet from MD5 a = 0x ; b = 0xefcdab89; c = 0x98badcfe; d = 0x ; Initial-step optimizations FF (a, b, c, d, w[0], 7, 0xd76aa478); FF (d, a, b, c, w[1], 12, 0xe8c7b756); FF (c, d, a, b, w[2], 17, 0x242070db); FF (b, c, d, a, w[3], 22, 0xc1bdceee);... The MD5 step macro looks like MD4 step macro in the beginning #define FF(a, b, c, d, x, s, ac) a += F (b, c, d) + x + ac; Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 12
13 a = 0x ; b = 0xefcdab89; c = 0x98badcfe; d = 0x ; FF (a, b, c, d, w[0], 7, 0xd76aa478); Initial-step optimizations The only unknown part in the first step is w[0] All the other data is known We can replace the original MD5 step macro: #define FF(a, b, c, d, x, s, ac) a += F (b, c, d) + x + ac;... With this one: #define FF(a, b, c, d, x, s, ac) a = 0xd76aa477 + x;... Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 13
14 Conclusion Initial-step optimizations Per step 1 In MD4, this saves 6 instructions (x AND, x NOT, x OR, x ADD) In MD5, this saves 6 instructions (x AND, x NOT, x OR, x ADD) TBD, add more hash-algorithms The next 3 steps can also be optimized like this Note that HMAC does not defeat this Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 14
15 Early-exit optimizations General Techniques Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 15
16 Here is a snippet from the last 4 steps of MD5 II (a, b, c, d, w[ 4], S41, 0xf7537e82); /* 61 */ II (d, a, b, c, w[11], S42, 0xbd3af235); /* 62 */ II (c, d, a, b, w[ 2], S43, 0x2ad7d2bb); /* 63 */ II (b, c, d, a, w[ 9], S44, 0xeb86d391); /* 64 */ Early-exit optimizations state[0] += a; state[1] += b; state[2] += c; state[3] += d; Again, in password guessing, the password is to short to force a second transform Thus, we know the value of state[0], which is 0x in MD4/MD5/SHA1 Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 16
17 Early-exit optimizations We know the value of state[0], which is 0x in MD4/MD5/SHA1 We simply subtract that constant from the hash we want to guess Example, if our hash is 8743b52063cd84097a65d1633f5c74f5, then we can do: hash[0] = 0x8743b520-0x = 0x1ffe921f Note that we do not need to be afraid to underflow the integer. Actually, this is exactly what hashes do, too Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 17
18 hash[0] = 0x8743b520-0x = 0x1ffe921f Early-exit optimizations Since a does not change anymore after step 61 in MD5 we can do the comparison that makes this optimization an earlyexit II (a, b, c, d, w[ 4], S41, 0xf7537e82); /* 61 */ if (a!= hash[0]) return - 1; II (d, a, b, c, w[11], S42, 0xbd3af235); /* 62 */ II (c, d, a, b, w[ 2], S43, 0x2ad7d2bb); /* 63 */ II (b, c, d, a, w[ 9], S44, 0xeb86d391); /* 64 */ Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 18
19 Conclusion Early-exit optimizations We can skip 3 entire steps In MD5, this means 30 instructions In MD4, this means 20 instructions TBD, add more hash-algorithms Note that Keccak is safe from this Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 19
20 Precomputing General Techniques Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 20
21 Precomputing This technique heavily depends on how much memory we have and how fast it is to lookup a value from a table Keep our eyes open to see chances for precomputation Typically they give high rates of optimization Good examples for this is the Whirlpool and Oracle (old) hash, we'll focus them later Example following Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 21
22 Assume we want to compute a SHA256 and we have a candidate generator that only changes the last characters of the password In other words, do not change the first 4 characters in w[0] If w[0] does not change, in step 1 we see: Precomputing t1 = H + S1(E) + Ch(E,F,G) + K[0] + W[0]; t2 = S0(A) + Maj(A,B,C); H = G; G = F; F = E; E = D + t1; D = C; C = B; B = A; A = t1 + t2; Since A - H and K[0] are all constants and w[0] does not change, we can precompute the new values for A and D completely In the inner loop, we can start from step2 Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 22
23 Partial reversing / Meet-in-the-middle General Techniques Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 23
24 This technique can not reverse back to it s original password, but it can be used to speed up the computation Partial reversing / Meet-in-themiddle There is that statement that MD5 is a one-way function. It s true and it s not true; In case we have the original data used to generate the MD5 digest we -can- reverse the digest back to the original MD5 initial values This works for MD4 and SHA1, too, maybe more But in password guessing, how does that make any sense since what we don't have is exactly the original data? Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 24
25 When we generate password candidates in our password guesser, we can generated them in a specific way Partial reversing / Meet-in-themiddle Assume we have a generator that only changes the first 4 characters of a password and hold the rest stay constant AAAApass AAABpass ZZZZpass As a result, we change only w[0] and w[1] w[15] stay constant Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 25
26 Partial reversing / Meet-in-themiddle In the outer loop The goal is to reverse back the algorithm steps as long w[0] is not required to compute that specific step Store the intermediate digest of that specific step In the inner loop Start the normal "forward" computation of the hash Once we hit the step 1.1 on which we calculated the intermediate digest we can stop the computation Compare the digest with the intermediate digest from step 1.2 If it does not match there is no need to continue to calculate the rest of the steps. This is what gives the speed boost Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 26
27 Targeted Algorithms Overview Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 27
28 Targeted Algorithms Algorithm MD4 MD5 SHA1 NetNTLMv1 Whirlpool Oracle (DES) HMAC Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 28
29 MD4 Targeted Algorithms Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 29
30 MD4 Used in MD4 (raw) NTLM Domain Cached Credentials Domain Cached Credentials2 NetNTLMv1 NetNTLMv2 Techniques Zero-based optimizations Initial-step optimizations Early-exit optimizations Precomputing Partial reversing / Meet-inthe-middle Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 30
31 MD4 It's a good example how to do all the techniques, especially the partial reversing As mentioned in the technique description we need to reverse the hash to a specific step This step is where w[0] is set the last time in the algorithm In case of MD4, it is step 33 HH (a, b, c, d, w[0], S31); Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 31
32 Here's the original HH step macro of MD4: MD4 #define HH(a, b, c, d, x, s) a += 0x6ed9eba1; a += x; a += H (b, c, d); a = ROTATE_LEFT (a, s); And the reversal is just an inverted function: #define HH_REV(a, b, c, d, x, s) a = ROTATE_RIGHT (a, s); a -= H (b, c, d); a -= x; a -= 0x6ed9eba1; Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 32
33 MD4 We call the inverted function from the last step back to step 34 HH_REV (d, a, b, c, w[ 8], S32); /* 34 */ We can not reverse more at this point since w[0] is unknown in the outer loop HH_REV (a, b, c, d, w[ 0], S31); /* 33 */ What we now have is the last intermediate value of D. This means we can do the comparison of D when it was set the last time which is: GG (d, a, b, c, w[ 7], S22); /* 30 */ Note that our meet-in-the-middle comparison is to do after step 30 Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 33
34 In our inner loop, we just compute MD4 forward: FF (a, b, c, d, x[ 0], S11); /* 1 */ FF (d, a, b, c, x[ 1], S12); /* 2 */ FF (c, d, a, b, x[ 2], S13); /* 3 */ MD4 Now we can do the compare at step 30 GG (a, b, c, d, x[ 3], S21); /* 29 */ GG (d, a, b, c, w[ 7], S22); if (d!= d_rev) return -1; If d does not match, there is no need to continue the computation Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 34
35 NOTE MD4 Actually it s possible to reverse this even more but this takes more explanation oclhashcat-lite does it s meet-in-the-middle comparison after step 26 Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 35
36 Conclusion MD4 We only need to calculate 30 of 48 steps due to the reversing resulting in 33% speed increase All other optimization techniques will also apply, but in combination with reversing they do not make sense, except the Initial-step optimization Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 36
37 MD5 Targeted Algorithms Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 37
38 MD5 Used in MD5 (raw) Everywhere Techniques Zero-based optimizations Initial-step optimizations Early-exit optimizations Precomputing Partial reversing / Meet-inthe-middle Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 38
39 The partial reversing works like in MD4 The inverted function looks a bit different MD5 #define II_REV(a, b, c, d, x, s, ac) a -= b; a = ROTATE_RIGHT (a, s); a -= I (b, c, d); a -= x; a -= ac; Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 39
40 Conclusion We only need to calculate 46 of 64 steps MD5 NOTE It s possible to reverse this even more but this takes more explanation oclhashcat-lite does it s meet-in-the-middle comparison after step 43 Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 40
41 SHA1 Targeted Algorithms Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 41
42 SHA1 Used in SHA1 (raw) Everywhere Techniques Zero-based optimizations Initial-step optimizations Early-exit optimizations Precomputing Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 42
43 SHA1 I've already published a very specific optimization technique for SHA1 that is a form of precomputing at Passwords^12 It works by reducing the number of XOR's that are required in the key-stretching phase and gains a total of 22% in performance increase It s too much to explain the details in this presentation. For details, please take a look at this PDF: There is another optimization for SHA1 based on early-exits You can use it as a standalone optimization in case you can not use the XOR based optimization and you can use it in combination with it. Both variants work Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 43
44 SHA1's step macro is a bit different to MD4 / MD5 It sets both B and E (not just A) for each step SHA1 #define F4(f,a,b,c,d,e,x) e += 0xca62c1d6; e += x; e += b ^ c ^ d; e += ROTATE_LEFT (a, 5); b = ROTATE_LEFT (b, 30); Typical implementation of the last steps looks like: F4 (d, e, a, b, c, w[77]); F4 (c, d, e, a, b, w[78]); F4 (b, c, d, e, a, w[79]); Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 44
45 From looking at the code one would say we can early-exit is in step 77, checking for E That s correct, but we can do more. Take a close look again at the step: b = ROTATE_LEFT (b, 30); SHA1 All it does is a simple rotate. Therefore we have no loss of information at all We know E at the end (from our hash) so we can pre-reverse it e = ROTATE_RIGHT (e, 30); Now, instead of doing an early-exit at step 77, we can do the early-exit at step 75 Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 45
46 Conclusion SHA1 22% increase due to XOR optimization Another 4 steps saved due to extended early-exit optimization Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 46
47 NetNTLMv1 Targeted Algorithms Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 47
48 NetNTLMv1 Used in Windows Networks File Shares SAMBA Technique Early-exit Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 48
49 NetNTLMv1 Even if it s just an early-exit, it s an early-exit with big impact To explain it, it s important to explain how to algorithm works NOTE Examples takes from hashcat.net forum Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 49
50 The algorithm work by generating an NTLM hash out of the password hashcat -> b4b9b02e6f09a9bd760f388b67351e2b This hash is then broken into 3 x 56 bit parts and padded with zeros NetNTLMv1 b4b9b02e6f09a9 bd760f388b6735 1e2b Each 56 bit part is odd parity adjusted to result in 3 x 64 bit parts b4b9b02e6f09a9 -> b55d6d04e bd760f388b6735 -> bcba83e6895b9d6b 1e2b > 1f15c NOTE: MD4 outputs only 128 bit, the third part uses only 16 bits Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 50
51 Each of these part is then used as a key to DES encrypt the 8 byte challenge resulting in 3 ciphertext blocks: b55d6d04e KEY-> DES( ) -> 51a539e6ee061f64 bcba83e6895b9d6b KEY-> DES( ) -> 7cd5d48ce6c f15c KEY-> DES( ) -> 3737c5e1de26ac4c NetNTLMv1 The key of the DES buffer that results in the 3737c5e1de26ac4c is limited to a keyspace of only 64k possible variants This is such a tiny keyspace so that we can brute-force it in the startup phase on CPU typically in less than a second Once we found the input key, we know the last 16 bit of the NTLM that was used to generate the NetNTLMv1 hash is 0x1e2b Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 51
52 Instead of doing all these steps again and again for each candidate, all we need to do is to generate the NTLM hash Then we do: NetNTLMv1 if ((d & 0xffff)!= d_pre) break; Once it passes this comparison (with a chance of 2^16) we continue to calculate the hash the original way Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 52
53 Conclusion NetNTLMv1 By doing this optimization we can crack NetNTLMv1 by nearly the same speed as an NTLM plus we still can use Zero-based optimizations and Initial-step optimizations to speed up the NTLM computation Especially on GPU s this optimization helps a lot since this save the expensive s-box lookups from DES The performance gain is massive and it s hard to calculate, but it s at least 5-10 times faster than without the optimization, maybe more Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 53
54 whirlpool Targeted Algorithms Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 54
55 Used in TrueCrypt Technique Precomputing whirlpool Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 55
56 whirlpool In whirlpool we can precompute all the rounds of K[] which takes 50% of the entire whirlpool computation otherwise K[] is based on the initial hash value, which is always 0 at start. For each round it s doing some s-box lookups and XOR s them with the old value I've written a C program for precomputing, you can grab it here: Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 56
57 But we can do even more! Once we have K[] precomputed we can reverse our target hash as we did in the early-exits in MD5/SHA1: state[0] = digest_buf[0] ^ pc_k[10][0]; state[1] = digest_buf[1] ^ pc_k[10][1]; state[2] = digest_buf[2] ^ pc_k[10][2];... whirlpool Still there is more room for optimization. Since whirlpool does not use any arithmetic instructions but only bitwise there is no data loss that we can not reproduce That means if we use our special password candidates generator again that only changes w[0] in the inner loops, we can precompute all values of the first round of Whirlpool In the first iteration we have to "correct" the data from the precomputation. That is because w[0] changed slightly. Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 57
58 Conclusion Whirlpool Whirlpool can be optimized by more than 50% of the entire calculation The optimization works even when protected with HMAC Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 58
59 Oracle (old) Targeted Algorithms Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 59
60 Used in Oracle 7-10g Technique Precomputing Oracle (old) Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 60
61 Oracle (old) This algorithm uses a cipher not a hash to store the password The scheme is the following: Encryption is DES-CBC IV = 0x KEY = 0x ABCDEF DATA = password In ciphers, to make cracking attempts slow, they have designed the keysetup phase to calculate slow In this algorithm is that part that should be the slow part, the keysetup, useless since it only the IV and the KEY and both of them are known :) We can precompute the slow part by 100%, the 16x 48-bit subkeys Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 61
62 Conclusion Oracle (old) Since the algorithm steps depend on the password length it s hard to say how much time is saved Again, especially on GPU s this optimization helps alot since this save the expensive s-box lookups from DES Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 62
63 HMAC Targeted Algorithms Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 63
64 HMAC Used in TrueCrypt WPA/WPA2 1password LUKS LastPass DCC2 PBKDF2 (always used) Technique Precomputing Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 64
65 HMAC Most important to say here, HMAC is not an algorithm itself. HMAC is a construction of a MAC (keyed hash) using a hash function We can call HMAC very important since it's used in many important algorithms to protect passwords It also defeats zero-based optimizations HMAC definition is simple HMAC (K,m) = H ((K ^ opad) H ((K ^ ipad) m)) Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 65
66 HMAC Because of the HMAC paddings of the ipad and the opad, we have a special situation The HMAC fills this buffer by it s definition with 0x and 0x5c5c5c5c5c5c5... and then XOR's the password on it This construct completely fills the buffers so that we have all data ready to run the first call to the selected hash transform We do this as soon we know the final password and then cache the results of both ipad and opad for later usage Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 66
67 Conclusion HMAC Reduces the number of calls to H() by 2 for each iteration Number of calls to H() in WPA/WPA2 is 4, lead to a performance increase of 50% compared to defender Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 67
68 Failed custom schemes Overview Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 68
69 Application IPB2 1Password Failure type Salt integration Block-chaining Failed custom Schemes Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 69
70 IPB2 Failed custom schemes Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 70
71 Used in Invision Power Board Technique Precomputing IPB2 Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 71
72 This is simple to explain The IPB2 scheme is defined as IPB2 md5 (md5 (salt) + md5 (pass)) Since the salt is known, we can precompute it after loading the hash Attacker requires just 2 calls to H() but defender requires 3 Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 72
73 IPB2 Conclusion Performance increased by > 30% Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 73
74 1Password Failed custom schemes Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 74
75 Used in AgileBits 1Password Techniques Early-exit Precomputing 1Password Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 75
76 1Password This is an example of how an algorithm was designed in a way where the designer was lacking the vision of an attacker 1Password uses PBKDF2-HMAC-SHA1 to derive a 256 bit key PBKDF2 can be configured on how much bits of output to produce In this case it s HMAC-SHA1, but SHA1 outputs only 160 bits. So that means the defender has to run two rounds on SHA1 to produce 320 bits output and then let PBKDF2 truncates it to 256 bits 1Password then uses AES in CBC mode to decrypt 1040 byte of data To be exact, it takes the first 128 bit of the derived key to setup the AES key and takes another 128 bit as an IV for the CBC Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 76
77 1Password The goal is match the final padding block after decrypting 1040 byte of data. If you find the last four 32-bit integers at 0x the padding is correct and you know your key was correct But in combination with the CBC mode you use the IV only for the first decryption. You then replace it with the ciphertext of current block (which is used for the next block) Again, to validate the masterkey is correct, all we need is to match the padding value. To satisfy the CBC we just need the previous 16 byte of data from the 1040 byte block. We do have it already since it was provided by the keychain There is no need to calculate the IV at all Instead of calculating a 256 bit key in the PBKDF2, we just need to calculate 128 bit Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 77
78 Conclusion 1Password Using both optimizations, Early-exit (using HMAC optimization) plus only calculating 128 bits instead of 256 increased the performance of an attacker compared to the defender by 400% Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 78
79 Feel free to contact me! Thank you for listening! via via Hashcat forum: via IRC: freenode #hashcat via atom at hashcat.net Jens Steube - Optimizing computation of Hash-Algorithms as an attacker 79
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Cryptography and Network Security Chapter 12
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 12 Message Authentication Codes At cats' green on the Sunday he
AD Image Encryption. Format Version 1.2
AD Image Encryption Format Version 1.2 17 May 2010 Table of Contents Introduction... 3 Overview... 3 Image Formats... 4 Keys... 4 Credentials... 4 Certificates... 4 Image Key encryption... 5 Appendix A
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 13
Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle Network Security Chapter 13 Some More Secure Channel Issues Outline In the course we have yet only seen catastrophic
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Message Authentication Codes. Lecture Outline
Message Authentication Codes Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Message Authentication Code Lecture Outline 1 Limitation of Using Hash Functions for Authentication Require an authentic
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Securing Password Storage Increasing Resistance to Brute Force Attacks
Securing Password Storage Increasing Resistance to Brute Force Attacks -john (Steven) Internal CTO @m1splacedsoul v0.4 Chandu Ketkar Technical Manager @cketkar Scott Matsumoto Principal Consultant @smatsumoto
Project: Simulated Encrypted File System (SEFS)
Project: Simulated Encrypted File System (SEFS) Omar Chowdhury Fall 2015 CS526: Information Security 1 Motivation Traditionally files are stored in the disk in plaintext. If the disk gets stolen by a perpetrator,
Designing Hash functions. Reviewing... Message Authentication Codes. and message authentication codes. We have seen how to authenticate messages:
Designing Hash functions and message authentication codes Reviewing... We have seen how to authenticate messages: Using symmetric encryption, in an heuristic fashion Using public-key encryption in interactive
SeChat: An AES Encrypted Chat
Name: Luis Miguel Cortés Peña GTID: 901 67 6476 GTG: gtg683t SeChat: An AES Encrypted Chat Abstract With the advancement in computer technology, it is now possible to break DES 56 bit key in a meaningful
Jeremi M Gosney Founder & CEO, Stricture Consulting Group
Jeremi M Gosney Founder & CEO, Stricture Consulting Group Passwords^12 Security Conference December 3, 2012 The Problem Password crackers need more power! Yes, really. A GPU is great! More GPUs are better.
Lecture 4 Data Encryption Standard (DES)
Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption
Message authentication
Message authentication -- Hash based MAC unctions -- MAC unctions based on bloc ciphers -- Authenticated encryption (c) Levente Buttyán ([email protected]) Secret preix method MAC (x) = H( x) insecure!
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Hash Function JH and the NIST SHA3 Hash Competition
Hash Function JH and the NIST SHA3 Hash Competition Hongjun Wu Nanyang Technological University Presented at ACNS 2012 1 Introduction to Hash Function Hash Function Design Basics Hash function JH Design
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Cryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR1318: Using the XMEGA built-in AES accelerator Features Full compliance with AES (FIPS Publication 197, 2002) - Both encryption and decryption procedures 128-bit Key and State memory XOR load option
Disk encryption... (not only) in Linux. Milan Brož [email protected]
Disk encryption... (not only) in Linux Milan Brož [email protected] FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
Cryptography Lecture 8. Digital signatures, hash functions
Cryptography Lecture 8 Digital signatures, hash functions A Message Authentication Code is what you get from symmetric cryptography A MAC is used to prevent Eve from creating a new message and inserting
Cryptography and Network Security Chapter 11
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 11 Cryptographic Hash Functions Each of the messages, like each
Speeding up GPU-based password cracking
Speeding up GPU-based password cracking SHARCS 2012 Martijn Sprengers 1,2 Lejla Batina 2,3 [email protected] KPMG IT Advisory 1 Radboud University Nijmegen 2 K.U. Leuven 3 March 17-18, 2012 Who
Fundamentals of Computer Security
Fundamentals of Computer Security Spring 2015 Radu Sion Intro Encryption Hash Functions A Message From Our Sponsors Fundamentals System/Network Security, crypto How do things work Why How to design secure
Binary Adders: Half Adders and Full Adders
Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. Securing Data-at-Rest: PC vs Smartphone Threat Model BlackBerry
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
Hash Functions. Integrity checks
Hash Functions EJ Jung slide 1 Integrity checks Integrity vs. Confidentiality! Integrity: attacker cannot tamper with message! Encryption may not guarantee integrity! Intuition: attacker may able to modify
ELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions
Assignment ELECTENG702 Advanced Embedded Systems Improving AES128 software for Altera Nios II processor using custom instructions October 1. 2005 Professor Zoran Salcic by Kilian Foerster 10-8 Claybrook
PKCS #5 v2.1: Password-Based Cryptography Standard
PKCS #5 v2.1: Password-Based Cryptography Standard Table of Contents RSA Laboratories October 27, 2012 TABLE OF CONTENTS... 1 1. INTRODUCTION... 2 2. NOTATION... 3 3. OVERVIEW... 4 4. SALT AND ITERATION
Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July 2006. The OWASP Foundation http://www.owasp.org/
Common Pitfalls in Cryptography for Software Developers OWASP AppSec Israel July 2006 Shay Zalalichin, CISSP AppSec Division Manager, Comsec Consulting [email protected] Copyright 2006 - The OWASP
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Solutions to Problem Set 1
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #8 Zheng Ma February 21, 2005 Solutions to Problem Set 1 Problem 1: Cracking the Hill cipher Suppose
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
Network Security. Modes of Operation. Steven M. Bellovin February 3, 2009 1
Modes of Operation Steven M. Bellovin February 3, 2009 1 Using Cryptography As we ve already seen, using cryptography properly is not easy Many pitfalls! Errors in use can lead to very easy attacks You
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
What users should know about Full Disk Encryption based on LUKS
What users should know about Full Disk Encryption based on LUKS Andrea VISCONTI Department of Computer Science Università degli Studi di Milano BunnyTN15 [email protected] December 17, 2015 1 /
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Password-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Overview of Symmetric Encryption
CS 361S Overview of Symmetric Encryption Vitaly Shmatikov Reading Assignment Read Kaufman 2.1-4 and 4.2 slide 2 Basic Problem ----- ----- -----? Given: both parties already know the same secret Goal: send
WIRELESS LAN SECURITY FUNDAMENTALS
WIRELESS LAN SECURITY FUNDAMENTALS Jone Ostebo November 2015 #ATM15ANZ @ArubaANZ Learning Goals Authentication with 802.1X But first: We need to understand some PKI And before that, we need a cryptography
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
Cryptography and Network Security Block Cipher
Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit
Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5
Written By: Adam Berent Advanced Encryption Standard by Example V.1.5 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
A low-cost Alternative for OAEP
A low-cost Alternative for OAEP Peter Schartner University of Klagenfurt Computer Science System Security [email protected] Technical Report TR-syssec-11-02 Abstract When encryption messages by use
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
Processing Multiple Buffers in Parallel to Increase Performance on Intel Architecture Processors
White Paper Vinodh Gopal Jim Guilford Wajdi Feghali Erdinc Ozturk Gil Wolrich Martin Dixon IA Architects Intel Corporation Processing Multiple Buffers in Parallel to Increase Performance on Intel Architecture
SHA3 WHERE WE VE BEEN WHERE WE RE GOING
SHA3 WHERE WE VE BEEN WHERE WE RE GOING Bill Burr May 1, 2013 updated version of John Kelsey s RSA2013 presentation Overview of Talk Where We ve Been: Ancient history 2004 The Competition Where We re Going
SkyRecon Cryptographic Module (SCM)
SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.
Thinking of a (block) cipher as a permutation (depending on the key) on strings of a certain size, we would not want such a permutation to have many
Fixed points of permutations Let f : S S be a permutation of a set S. An element s S is a fixed point of f if f(s) = s. That is, the fixed points of a permutation are the points not moved by the permutation.
Symmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal
Symmetric Crypto Pierre-Alain Fouque Birthday Paradox In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal N=365, about 23 people are
Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7
Written By: Adam Berent Advanced Encryption Standard by Example V.1.7 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)
Public Key Cryptography Overview
Ch.20 Public-Key Cryptography and Message Authentication I will talk about it later in this class Final: Wen (5/13) 1630-1830 HOLM 248» give you a sample exam» Mostly similar to homeworks» no electronic
Cryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon
Waspmote Encryption Libraries. Programming guide
Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7
Protection Profile for Full Disk Encryption
Protection Profile for Full Disk Encryption Mitigating the Risk of a Lost or Stolen Hard Disk Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP...
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Cryptography and Network Security Chapter 11. Fourth Edition by William Stallings
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Chapter 11 Message Authentication and Hash Functions At cats' green on the Sunday he took the message from the inside of
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
Password Cracking Beyond Brute-Force
Password Cracking Beyond Brute-Force by Immanuel Willi Most password mechanisms work by comparing a password against a stored reference value. It is insecure to store the whole password, so one-way functions
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm
Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers
PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.
PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and
Let s put together a Manual Processor
Lecture 14 Let s put together a Manual Processor Hardware Lecture 14 Slide 1 The processor Inside every computer there is at least one processor which can take an instruction, some operands and produce
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...
Hush Encryption Engine White Paper Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...4 Passphrase Requirements...4 Data Requirements...4
Password Manager with 3-Step Authentication System
Password Manager with 3-Step Authentication System Zhelyazko Petrov, Razvan Ragazan University of Westminster, London [email protected], [email protected] Abstract: A big
The Keyed-Hash Message Authentication Code (HMAC)
FIPS PUB 198-1 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory
SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Encrypting Network Traffic
Encrypting Network Traffic Mark Lomas Computer Security Group University of Cambridge Computer Laboratory Encryption may be used to maintain the secrecy of information, to help detect when messages have
Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay
Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -721302 Objectives Introduction
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Efficient Software Implementation of AES on 32-bit Platforms
Efficient Software Implementation of AES on 32-bit Platforms Guido Bertoni, Luca Breveglieri Politecnico di Milano, Milano - Italy Pasqualina Lilli Lilli Fragneto AST-LAB of ST Microelectronics, Agrate
Passwords the server side
Passwords the server side A tour of decreasingly bad ideas regarding server-side password handling. Thomas Waldmann @ EuroPython 2013 Disclaimer I am not a crypto or security expert, just a caring developer
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
SYMMETRIC ENCRYPTION. Mihir Bellare UCSD 1
SYMMETRIC ENCRYPTION Mihir Bellare UCSD 1 Syntax A symmetric encryption scheme SE = (K,E,D) consists of three algorithms: K and E may be randomized, but D must be deterministic. Mihir Bellare UCSD 2 Correct
The State of Modern Password Cracking
SESSION ID: PDAC-W05 The State of Modern Password Cracking Christopher Camejo Director of Threat and Vulnerability Analysis NTT Com Security @0x434a Presentation Overview Password Hashing 101 Getting Hashes
Using TrueCrypt to protect data
Using TrueCrypt to protect data Password protecting and encrypting files one by one is a certainly an effective way to securely store and share data. However, what if you have a lot of files? Creating
