Tools in Cryptanalysis of Hash Functions
|
|
|
- Jeffrey Summers
- 10 years ago
- Views:
Transcription
1 Tools in Cryptanalysis of Hash Functions Application to SHA-256 Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology Inffeldgasse 16a, A-8010 Graz, Austria
2 Outline 1 Motivation 2 The SHA-2 family 3 Collision Attacks on Reduced SHA Application to other Hash Functions 5 Summary and Future Work
3 Outline 1 Motivation 2 The SHA-2 family 3 Collision Attacks on Reduced SHA Application to other Hash Functions 5 Summary and Future Work
4 Attacks on the MD4-family MD4 SHA-1 RIPEMD-128 MD5 SHA-0 HAVAL RIPEMD RIPEMD-160 SHA-224 SHA-256 SHA-384 SHA-512
5 Consequences of the Attacks Transition from SHA-1 to SHA-2 NIST proposed the transition from SHA-1 to the SHA-2 family Companies and organization are expected to migrate to SHA-2 SHA-3 initiative Researchers were evaluating alternative hash functions in the SHA-3 initiative organized by NIST NIST selected Keccak as SHA-3
6 Results for SHA-256 Preimage Attack Aoki et al. [AGM + 09] 43 out of 64 steps (complexity: ) Khovratovich et al. [KRS12] 45 out of 64 steps (complexity: ) Collision Attack Nikolić and Biryukov [NB08] 21 out of 64 steps (example) Indesteege et al. [IMPR08]; Sanadhya and Sarkar [SS08] 24 out of 64 steps (example)
7 Outline 1 Motivation 2 The SHA-2 family 3 Collision Attacks on Reduced SHA Application to other Hash Functions 5 Summary and Future Work
8 The SHA-2 Family Designed by NSA and issued by NIST in Defined in the Federal Information Processing Standard (FIPS-180-3) Part of several international standards Often recommended as an alternative to SHA-1 Consists of 4 hash functions, i.e. SHA-224, SHA-256, SHA-384, SHA-512
9 Description of SHA-256 Iterated hash function processing message blocks of 512 bits and producing a hash value of 256 bits. Compression function f consists of 2 parts: Message Expansion State Update (64 steps) M 1 M 2 M 3 M t IV f f f f h
10 Message Expansion The message expansion of SHA-256 splits the 512-bit message block into 16 words M i, i = 0,..., 15, and expands them into 64 expanded message words W i as follows: { Mi 0 i < 16 W i = σ 1 (W i 2 ) + W i 7 + σ 0 (W i 15 ) + W i i < 64 The functions σ 0 (X) and σ 1 (X) are given by σ 0 (X) = (X 7) (X 18) (X 3) σ 1 (X) = (X 17) (X 19) (X 10)
11 Step Function of SHA-256 A i 1 B i 1 C i 1 D i 1 E i 1 F i 1 G i 1 H i 1 Σ 1 Σ 0 K i f 0 f 1 W i A i B i C i D i E i F i G i H i
12 Step Function of SHA-256 The bitwise Boolean functions f 0 and f 1 used in each step are defined as follows: f 0 (X, Y, Z ) = X Y Y Z X Z f 1 (X, Y, Z ) = X Y X Z The linear functions Σ 0 and Σ 1 are defined as follows: Σ 0 (X) = (X 2) (X 13) (X 22) Σ 1 (X) = (X 6) (X 11) (X 25)
13 Outline 1 Motivation 2 The SHA-2 family 3 Collision Attacks on Reduced SHA Application to other Hash Functions 5 Summary and Future Work
14 Our Contribution Advanced Automatic Search Tool Finding complex differential characteristics for SHA-2 automatically Similar to the one for SHA-1 by De Cannière and Rechberger [DR06] Collisions Attacks on SHA-256 Collisions for up to 38 steps of the compression function Collisions for up to 31 steps of the hash function
15 Collision Attacks m m H H h = h Birthday Attack: 2 n/2
16 Collision Attacks (Differential View) m m m 0 H H H h = h h = 0 Find a differential characteristic which results in a collision with a good probability Find a message m following the differential characteristic to get a colliding message pair (m, m )
17 Collision Attacks on SHA-256 All collisions attacks so far are of practical complexity They are all based on the same basic idea: extending a local collision over 9 steps to more steps The best collision attack so far is for 24 steps based on the 9-step differential characteristic of Nikolić and Biryukov
18 Basic Attack Strategy To find collisions for more than 24 steps, we need differential characteristics spanning over t > 9 steps To find these characteristics we proceed as follows: (1) Fix the value of t (2) Identify those message words which need to have differences to result in a valid differential characteristic for the message expansion (3) Consider only the candidates that may result in a collision for more than 24 steps (4) Use an automatic search tool to construct a valid differential characteristic for both the state update transformation and the message expansion
19 Candidate for 27 Steps For t = 10 we already find a candidate which may result in a collision for 27 steps step A B C D E F G H W 4? 5?? 6???? 7????? 8?????? 9????? 10???? 11??? 12??? 13?? 14 W x x 13 x x x 20 x x
20 Finding Differential Characteristics These characteristics can not be constructed manually A sophisticated automatic search tool is needed to construct these characteristics Gröbner Basis, SAT solvers,... Dedicated Approach [DR06] (Guess-and-Determine)
21 Guess-and-Determine Attack On a high level, a guess-and-determine attack can be described as a repetition of the following two steps guess the value of some unknowns determine the value of as many unknowns as is possible until all unknowns have been determined
22 Guess-and-Determine Attack A guess-and-determine attack works specially well if there are many sparse equations the set of equations can be split into a number of subsets with very few variables occurring in more than one subset A successful attack employs a strategy to convert the complex and dense equations into a form that is more amenable to attack
23 De Cannière and Rechberger Approach for SHA-1 Generalized Conditions All 16 possible conditions on a pair of bits are taken into account. (X i, X i ) (0, 0) (1, 0) (0, 1) (1, 1)? x u n # (X i, Xi ) (0, 0) (1, 0) (0, 1) (1, 1) A - - B - C - - D - E -
24 De Cannière and Rechberger Approach for SHA-1 Search Algorithm (1) Start with an unrestricted characteristic (only? ) (2) Successively impose new conditions on the characteristic (replace? by - and x by n or u ) (3) Propagate the conditions in a bitslice manner and check for consistency If a contradiction occurs then backtrack else proceed with step 2 (4) Repeat steps 2 and 3 until all bits of the characteristic are determined
25 Increased Complexity of SHA-2 SHA-1 Ai 1 Bi 1 Ci 1 SHA-2 Di 1 Ei 1 Fi 1 Gi 1 Hi 1 Ai 1 Bi 1 Ci 1 Di 1 Ei 1 5 Ki Σ0 Σ1 Ki f f0 f1 2 Wi Wi Ai Bi Ci Di Ei Ai Bi Ci Di Ei Fi Gi Hi Design Complexity
26 How to overcome the problems? Use alternative description of state update Identify more complex conditions involving several bits Use modified search algorithm Combine search for differential characteristic and message pair Apply sophisticated tests to detect contradictions earlier
27 Example Collision for 27 Steps of SHA-256 Compression Function
28 Candidate for 27 Steps For t = 10 we already find a candidate which may result in a collision for 27 steps step A B C D E F G H W 4? 5?? 6???? 7????? 8?????? 9????? 10???? 11??? 12??? 13?? 14 W x x 13 x x x 20 x x
29 i Ai Ei Wi ???????????????????????????????????????????????????????????????????????????????????????????????? 5???????????????????????????????????????????????????????????????? ???????????????????????????????? ???????????????????????????????? ???????????????????????????????? ???????????????????????????????? ???????????????????????????????? ???????????????????????????????? # freebits: 352 # backtrack: 0
30 Results for the Compression Function Example of a collision for 27 steps of the compression function (seconds on a standard PC) h 0 4d b1c18f c8c014f2 3cca74bd 58481e1b c7dd5a1e 0ae3c962 e01f0e96 e4e9607f b6fb6b e b614 d4dbb9af 8a228a75 3c660afd 55b668bc m 97121d5e 35214e08 174b5fbb 1dc549e5 7e5b858a c966e506 faac3dbc 9df96855 m e4e9607f b6fb6b e b614 d543baaf 8a228a75 3c660afd 55b668bc 97121d5e 35214e08 174b5fbb 1dc549e5 7e0bb58a c8fee406 faac3dbc 9df m h 1 9f9579f2 2737d03f 20263c5b 1b802daf 0b5e24ad 9eed0964 6bb8f239 2a4c60f7
31 Extending the Attack to more Steps Example of a collision for 38 steps of the compression function (about 8 hours on a standard PC) h 0 ba75b4ac c3c9fd45 fce04f3a 6d620fdb 42559d01 b0a0cd10 729ca9bc b284a572 4f5267f8 8f8ec13b 22371c f2b d e 98947e ef31 m 06e98ffc 4babda4a bf9f3be 7b3b74e1 065f711d 6c6ead5e a1781d54 m 4f5267f8 8f8ec13b 22371c f2b d e 98947e61 7e73f1f1 06e babda4a 277f1447 3bf9f3be 7b3b74e1 065f711d 6c6ead5e a1781d e661ec0 m 00001ffc ff h 1 baa8df17 9f9f64dd d57d5c2c 7b232c81 1f3916e6 7a03a2be 7afb1d86 6b0eced6
32 Results for the Hash Function Extending the Attack to the Hash Function Approach of Indesteege et al. [IMPR08] Construct a collision for the compression function (with no differences in the first message words) Use the freedom in the first message words to turn it into a collision for the hash function Collision attack on 28 steps of SHA-256 W x 9 x x x x x x x x x x 24 x x 25 x x 26 27
33 Results for the Hash Function Example of a collision for 28 steps of the hash function h 0 6a09e667 bb67ae85 3c6ef372 a54ff53a 510e527f 9b05688c 1f83d9ab 5be0cd19 14c48440 b3c3277f ad69812d c3d4dffa 7eae690b 7f9fe aece8 9a m 1607a45c db81bdc8 8786e031 d8f b6be5e 45a2652f f3fbb17a 2ce70f52 m 14c48440 b3c3277f ad69812d c3d4dffa 7eae690b 7f9fe aece8 9a e6b2f4fc d759b e031 d8f b6be5e 47e26dbf f3fbb17a 2ce70f m f0b550a0 0cd804f h cd0062bc 7e8f8c d49075a 327f38e8 11f0d36d Theoretical collision attack on SHA-256 reduced to 31 steps (complexity )
34 Outline 1 Motivation 2 The SHA-2 family 3 Collision Attacks on Reduced SHA Application to other Hash Functions 5 Summary and Future Work
35 RIPEMD-128/160 Designed by Dobbertin, Bosselaers and Preneel in 1996 ISO/IEC standard on dedicated hash function Similar design principle as MD5 and SHA-1 Results: RIPEMD-128 component attack steps complexity compression collision 48 example hash collision 38 example hash near-collision 44 example hash non-randomness RIPEMD-160 compression collision 48 example
36 Other HAS-160 SM3 Standardized by the Korean government Similar design principle as SHA-1 Results: component attack steps complexity compression collision 65 example Standardized by the Chinese government Similar design principle as SHA-256 Results: component attack steps complexity compression collision 24 example hash collision 20 example
37 Outline 1 Motivation 2 The SHA-2 family 3 Collision Attacks on Reduced SHA Application to other Hash Functions 5 Summary and Future Work
38 Summary and Future Work Summary Sophisticated tool to construct complex differential characteristics Attacks on several popular hash functions SHA-256, RIPEMD-128/160, SM3,... Current/Future Work Application to other hash functions Analysis of keyed functions, e.g. HMAC Still lots of work to be done!
39 Thank you for your attention!
40 References I Kazumaro Aoki, Jian Guo, Krystian Matusiewicz, Yu Sasaki, and Lei Wang. Preimages for Step-Reduced SHA-2. In Mitsuru Matsui, editor, ASIACRYPT, volume 5912 of LNCS, pages Springer, Alex Biryukov, Mario Lamberger, Florian Mendel, and Ivica Nikolic. Second-Order Differential Collisions for Reduced SHA-256. In Dong Hoon Lee and Xiaoyun Wang, editors, ASIACRYPT, volume 7073 of LNCS, pages Springer, Christophe De Cannière and Christian Rechberger. Finding SHA-1 Characteristics: General Results and Applications. In Xuejia Lai and Kefei Chen, editors, ASIACRYPT, volume 4284 of LNCS, pages Springer, Sebastiaan Indesteege, Florian Mendel, Bart Preneel, and Christian Rechberger. Collisions and Other Non-random Properties for Step-Reduced SHA-256. In Roberto Maria Avanzi, Liam Keliher, and Francesco Sica, editors, Selected Areas in Cryptography, volume 5381 of LNCS, pages Springer, Dmitry Khovratovich, Christian Rechberger, and Alexandra Savelieva. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. In Anne Canteaut, editor, FSE, volume 7549 of LNCS, pages Springer, Florian Mendel, Tomislav Nad, and Martin Schläffer. Cryptanalysis of Round-Reduced HAS-160. In Howon Kim, editor, ICISC, volume 7259 of LNCS, pages Springer, 2011.
41 References II Florian Mendel, Tomislav Nad, and Martin Schläffer. Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions. In Dong Hoon Lee and Xiaoyun Wang, editors, ASIACRYPT, volume 7073 of LNCS, pages Springer, Florian Mendel, Tomislav Nad, and Martin Schläffer. Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128. In Anne Canteaut, editor, FSE, volume 7549 of LNCS, pages Springer, Florian Mendel, Tomislav Nad, and Martin Schläffer. Finding Collisions for Round-Reduced SM3. In Ed Dawson, editor, Topics in Cryptology - CT-RSA 2013, volume 7779 of LNCS, pages Springer, Florian Mendel, Tomislav Nad, and Martin Schläffer. Improving Local Collisions: New Attacks on Reduced SHA-256. In Thomas Johansson and Phong Q. Nguyen, editors, EUROCRYPT, LNCS. Springer, To appear. Florian Mendel, Tomislav Nad, Stefan Scherz, and Martin Schläffer. Differential Attacks on Reduced RIPEMD-160. In Dieter Gollmann and Felix C. Freiling, editors, ISC, volume 7483 of LNCS, pages Springer, Ivica Nikolić and Alex Biryukov. Collisions for Step-Reduced SHA-256. In Kaisa Nyberg, editor, FSE, volume 5086 of LNCS, pages Springer, 2008.
42 References III Somitra Kumar Sanadhya and Palash Sarkar. New Collision Attacks against Up to 24-Step SHA-2. In Dipanwita Roy Chowdhury, Vincent Rijmen, and Abhijit Das, editors, INDOCRYPT, volume 5365 of LNCS, pages Springer, 2008.
How To Attack Preimage On Hash Function 2.2 With A Preimage Attack On A Pre Image
Preimage Attacks on 4-Step SHA-256 and 46-Step SHA-52 Yu Sasaki, Lei Wang 2, and Kazumaro Aoki NTT Information Sharing Platform Laboratories, NTT Corporation 3-9- Midori-cho, Musashino-shi, Tokyo, 8-8585
Differential Cryptanalysis of Hash Functions: How to find Collisions?
Differential Cryptanalysis of Hash Functions: How to find Collisions? Martin Schläffer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria [email protected]
How to Break MD5 and Other Hash Functions
How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan 250100, China [email protected] [email protected] Abstract. MD5 is one of the most widely used cryptographic
Grøstl a SHA-3 candidate
Grøstl a SHA-3 candidate Krystian Matusiewicz Wroclaw University of Technology CECC 2010, June 12, 2010 Krystian Matusiewicz Grøstl a SHA-3 candidate 1/ 26 Talk outline Cryptographic hash functions NIST
Visa Smart Debit/Credit Certificate Authority Public Keys
CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition
The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition Bart Preneel Katholieke Universiteit Leuven and IBBT Dept. Electrical Engineering-ESAT/COSIC, Kasteelpark Arenberg 10 Bus
Chapter 1 On the Secure Hash Algorithm family
Chapter 1 On the Secure Hash Algorithm family Written by Wouter Penard, Tim van Werkhoven. 1.1 Introduction This report is on the Secure Hash Algorithm family, better known as the SHA hash functions. We
Ascon. Ch. Dobraunig 1, M. Eichlseder 1, F. Mendel 1, M. Schläffer 2. 22nd Crypto Day, Infineon, Munich. (A Submission to CAESAR)
Ascon (A Submission to CAESAR) Ch. Dobraunig 1, M. Eichlseder 1, F. Mendel 1, M. Schläffer 2 1 IAIK, Graz University of Technology, Austria 2 Infineon Technologies AG, Austria 22nd Crypto Day, Infineon,
Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.7
Written By: Adam Berent Advanced Encryption Standard by Example V.1.7 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)
Advanced Encryption Standard by Example. 1.0 Preface. 2.0 Terminology. Written By: Adam Berent V.1.5
Written By: Adam Berent Advanced Encryption Standard by Example V.1.5 1.0 Preface The following document provides a detailed and easy to understand explanation of the implementation of the AES (RIJNDAEL)
Hash Function JH and the NIST SHA3 Hash Competition
Hash Function JH and the NIST SHA3 Hash Competition Hongjun Wu Nanyang Technological University Presented at ACNS 2012 1 Introduction to Hash Function Hash Function Design Basics Hash function JH Design
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard
KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard Dr. Gavekort c/o Vakiopaine Bar Kauppakatu 6, 41 Jyväskylä FINLAND [email protected] Abstract. We have discovered that the
Cryptography for Network Security: Failures, Successes and Challenges
Cryptography for Network Security: Failures, Successes and Challenges Bart Preneel Katholieke Universiteit Leuven and IBBT Dept. Electrical Engineering-ESAT/COSIC, Kasteelpark Arenberg 10 Bus 2446, B-3001
lundi 1 octobre 2012 In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal
Symmetric Crypto Pierre-Alain Fouque Birthday Paradox In a set of N elements, by picking at random N elements, we have with high probability a collision two elements are equal N=365, about 23 people are
An Efficient Cryptographic Hash Algorithm (BSA)
An Efficient Cryptographic Hash Algorithm (BSA) Subhabrata Mukherjee 1, Bimal Roy 2, Anirban Laha 1 1 Dept of CSE, Jadavpur University, Calcutta 700 032, India 2 Indian Statistical Institute, Calcutta
The Stream Cipher HC-128
The Stream Cipher HC-128 Hongjun Wu Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium [email protected] Statement 1. HC-128 supports 128-bit
SHA3 WHERE WE VE BEEN WHERE WE RE GOING
SHA3 WHERE WE VE BEEN WHERE WE RE GOING Bill Burr May 1, 2013 updated version of John Kelsey s RSA2013 presentation Overview of Talk Where We ve Been: Ancient history 2004 The Competition Where We re Going
The 128-bit Blockcipher CLEFIA Design Rationale
The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007 Sony Corporation NOTICE THIS DOCUMENT IS PROVIDED AS IS, WITH NO WARRANTIES WHATSOVER, INCLUDING ANY WARRANTY OF MERCHANTABIL-
Length extension attack on narrow-pipe SHA-3 candidates
Length extension attack on narrow-pipe SHA-3 candidates Danilo Gligoroski Department of Telematics, Norwegian University of Science and Technology, O.S.Bragstads plass 2B, N-7491 Trondheim, NORWAY [email protected]
Cryptography and Network Security Chapter 11
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 11 Cryptographic Hash Functions Each of the messages, like each
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
On Collisions for MD5
Eindhoven University of Technology Department of Mathematics and Computing Science MASTER S THESIS On Collisions for MD5 By M.M.J. Stevens Supervisor: Prof. dr. ir. H.C.A. van Tilborg Advisors: Dr. B.M.M.
Permutation-based encryption, authentication and authenticated encryption
Permutation-based encryption, authentication and authenticated encryption Guido Bertoni 1, Joan Daemen 1, Michaël Peeters 2, and Gilles Van Assche 1 1 STMicroelectronics 2 NXP Semiconductors Abstract.
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT Jorge Nakahara Jr 1, Pouyan Sepehrdad 1, Bingsheng Zhang 2, Meiqin Wang 3 1 EPFL, Lausanne, Switzerland 2 Cybernetica AS, Estonia and
Cryptographic Hash Functions Message Authentication Digital Signatures
Cryptographic Hash Functions Message Authentication Digital Signatures Abstract We will discuss Cryptographic hash functions Message authentication codes HMAC and CBC-MAC Digital signatures 2 Encryption/Decryption
A NEW HASH ALGORITHM: Khichidi-1
A NEW HASH ALGORITHM: Khichidi-1 Abstract This is a technical document describing a new hash algorithm called Khichidi-1 and has been written in response to a Hash competition (SHA-3) called by National
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors Deukjo Hong 1, Jung-Keun Lee 1, Dong-Chan Kim 1, Daesung Kwon 1, Kwon Ho Ryu 1, and Dong-Geon Lee 2 1 Attached Institute of ETRI {hongdj,
One-Way Encryption and Message Authentication
One-Way Encryption and Message Authentication Cryptographic Hash Functions Johannes Mittmann [email protected] Zentrum Mathematik Technische Universität München (TUM) 3 rd Joint Advanced Student School
Recommendation for Applications Using Approved Hash Algorithms
NIST Special Publication 800-107 Recommendation for Applications Using Approved Hash Algorithms Quynh Dang Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T Y February
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
Lecture Notes in Computer Science
Lecture Notes in Computer Science Edited by G. Goos, J. Hartmanis and J. van Leeuwen 1267 Advisory Board: W. Brauer D. Gries J. Stoer Springer Berlin Heidelberg New York Barcelona Budapest Hong Kong London
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT Onur Özen1, Kerem Varıcı 2, Cihangir Tezcan 3, and Çelebi Kocair 4 1 EPFL IC LACAL Station 14. CH-1015 Lausanne, Switzerland
Chapter 6. Hash Functions. 6.1 The hash function SHA1
Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length
On the Influence of the Algebraic Degree of the Algebraic Degree of
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 1, JANUARY 2013 691 On the Influence of the Algebraic Degree of the Algebraic Degree of Christina Boura and Anne Canteaut on Abstract We present a
Comparison of seven SHA-3 candidates software implementations on smart cards.
Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010 Abstract In this work, we present
Hash Functions. Integrity checks
Hash Functions EJ Jung slide 1 Integrity checks Integrity vs. Confidentiality! Integrity: attacker cannot tamper with message! Encryption may not guarantee integrity! Intuition: attacker may able to modify
SERVER CERTIFICATES OF THE VETUMA SERVICE
Page 1 Version: 3.4, 19.12.2014 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.4, 19.12.2014 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Unknown Plaintext Template Attacks
Unknown Plaintext Template Attacks Neil Hanley, Michael Tunstall 2, and William P. Marnane Department of Electrical and Electronic Engineering, University College Cork, Ireland. [email protected], [email protected]
Rijndael Encryption implementation on different platforms, with emphasis on performance
Rijndael Encryption implementation on different platforms, with emphasis on performance KAFUUMA JOHN SSENYONJO Bsc (Hons) Computer Software Theory University of Bath May 2005 Rijndael Encryption implementation
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement Bartosz Zoltak www.vmpcfunction.com [email protected] Abstract. We found a statistical weakness in the Spritz algorithm
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
SFLASH v3, a fast asymmetric signature scheme
SFLASH v3, a fast asymmetric signature scheme Specification of SFLASH, version 3.0., 17 October 2003 The authors still recommend SFLASH-v2, see below. Nicolas T. Courtois 1, Louis Goubin 1 and Jacques
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
A New 128-bit Key Stream Cipher LEX
A New 128-it Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenerg 10, B 3001 Heverlee, Belgium http://www.esat.kuleuven.ac.e/~airyuko/ Astract.
6 Data Encryption Standard (DES)
6 Data Encryption Standard (DES) Objectives In this chapter, we discuss the Data Encryption Standard (DES), the modern symmetric-key block cipher. The following are our main objectives for this chapter:
Evaluation of Digital Signature Process
Evaluation of Digital Signature Process Emil SIMION, Ph. D. email: [email protected] Agenda Evaluation of digital signatures schemes: evaluation criteria; security evaluation; security of hash functions;
International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi,
Practical Attacks on Digital Signatures Using MD5 Message Digest
Practical Attacks on Digital Signatures Using Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic [email protected]
Hash Function of Finalist SHA-3: Analysis Study
International Journal of Advanced Computer Science and Information Technology (IJACSIT) Vol. 2, No. 2, April 2013, Page: 1-12, ISSN: 2296-1739 Helvetic Editions LTD, Switzerland www.elvedit.com Hash Function
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
Added Advanced Encryption Standard (A-Aes): With 512 Bits Data Block And 512, 768 And 1024 Bits Encryption Key
Added Advanced Encryption Standard (A-Aes): With 512 Bits Data Block And 512, 768 And 1024 Bits Encryption Key Mahra Kumar Shrivas Lecturer Information Technology Sikkim Manipal University, Kumasi, Ghana
SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI User Guide
SL-8800 HDCP 2.2 and HDCP 1.x Protocol Analyzer for HDMI Simplay-UG-02003-A July 2015 Contents 1. Overview... 4 1.1. SL-8800 HDCP Protocol Analyzer Test Equipment... 4 1.2. HDCP 2.2/HDCP 1.x Protocol Analyzer
Algorithms and Parameters for Secure Electronic Signatures V.1.44 DRAFT May 4 th., 2001
Title: Algorithms and Parameters for Secure Electronic Signatures Source: This document is the outcome of the work of the Algorithms group (ALGO) working under the umbrella of - SG (European Electronic
M.S. Project Proposal. SAT Based Attacks on SipHash
M.S. Project Proposal SAT Based Attacks on SipHash Santhosh Kantharaju Siddappa Department of Computer Science Rochester Institute of Technology Chair Prof. Alan Kaminsky Reader Prof. Stanisław P. Radziszowski
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
On the Impact of Known-Key Attacks on Hash Functions
On the Impact of Known-Key Attacs on Hash Functions Bart Mennin and Bart Preneel Dept Electrical Engineering, ESAT/COSIC, KU Leuven, and iminds, Belgium bartmennin@esatuleuvenbe, bartpreneel@esatuleuvenbe
C O M P U T E R S E C U R I T Y
NIST Special Publication 800-56C Recommendation for Key Derivation through Extraction-then-Expansion Lily Chen Computer Security Division Information Technology Laboratory C O M P U T E R S E C U R I T
Scilab Textbook Companion for Digital Electronics: An Introduction To Theory And Practice by W. H. Gothmann 1
Scilab Textbook Companion for Digital Electronics: An Introduction To Theory And Practice by W. H. Gothmann 1 Created by Aritra Ray B.Tech Electronics Engineering NIT-DURGAPUR College Teacher Prof. Sabyasachi
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected].
Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc [email protected] Overview Cryptanalysis Challenge Encryption: DES AES Message
Elliptic Curve Hash (and Sign)
Elliptic Curve Hash (and Sign) (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep 22-24 2008 Dan Brown (Certicom) Elliptic Curve Hash (and Sign) ECC 2008 1 / 43
Differences Between SSLv2, SSLv3, and TLS
Differences Between SSLv2, SSLv3, and TLS Loren Weith: 0600978 July 3, 2006 SSLv2, SSLv3, and TLS (1.0) all provide for a secure channel between clients and servers: if looked at in terms of the OSI reference
ETSI TS 102 176-1 V2.0.0 (2007-11) Technical Specification
TS 102 176-1 V2.0.0 (2007-11) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 1: Hash functions and asymmetric
USB HID to PS/2 Scan Code Translation Table
Key Name HID Usage Page HID Usage ID PS/2 Set 1 Make* PS/2 Set 1 Break* PS/2 Set 2 Make PS/2 Set 2 Break System Power 01 81 E0 5E E0 DE E0 37 E0 F0 37 System Sleep 01 82 E0 5F E0 DF E0 3F E0 F0 3F System
2010 JOURNAL OF SOFTWARE, VOL. 9, NO. 8, AUGUST 2014
2010 JOURNAL OF SOFTWARE VOL. 9 NO. 8 AUGUST 2014 Analysis of a Multivariate Public Key Cryptosystem and Its Application in Software Copy Protection Ning Huang Center of Modern Educational Technology Gannan
Cryptography and Network Security Chapter 12
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 12 Message Authentication Codes At cats' green on the Sunday he
CRYPTANALYSIS OF HASH FUNCTIONS USING ADVANCED MULTIPROCESSING
CRYPTANALYSIS OF HASH FUNCTIONS USING ADVANCED MULTIPROCESSING Gómez J., Montoya F.G., Benedicto R., Jimenez A., Gil C. and Alcayde A. University of Almeria, Spain {jgomez, pagilm, rbenedicto, ajimenez,
BPS: a Format-Preserving Encryption Proposal
BPS: a Format-Preserving Encryption Proposal Eric Brier, Thomas Peyrin and Jacques Stern Ingenico, France {forenare.nare}@ingenico.cor Abstract. In recent months, attacks on servers of payment processors
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
Sosemanuk, a fast software-oriented stream cipher
Sosemanuk, a fast software-oriented stream cipher C. Berbain 1, O. Billet 1, A. Canteaut 2, N. Courtois 3, H. Gilbert 1, L. Goubin 4, A. Gouget 5, L. Granboulan 6, C. Lauradoux 2, M. Minier 2, T. Pornin
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Establishing a Mechanism for Maintaining File Integrity within the Data Archive
Establishing a Mechanism for Maintaining File Integrity within the Data Archive Thomas C. Stein, Edward A. Guinness, Susan H. Slavney Earth and Planetary Sciences, Washington University, St. Louis, MO,
Secure Applications of Low-Entropy Keys
Secure Applications of Low-Entropy Keys John Kelsey Bruce Schneier Chris Hall David Wagner Counterpane Systems U.C. Berkeley {kelsey,schneier,hall}@counterpane.com [email protected] Abstract. We introduce
NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Medical Administrative Aspects
NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ALMA 120 Course Title: Medical Administrative Aspects Division: Applied Science (AS) Liberal Arts (LA) Workforce
