Hashing MD5 SHA
Hashing MD5 SHA
Topics
Overview of Cryptography Hash Function
Usages
Properties
Hashing Function Structure
Attack on Hash Function
The Road to new Secure Hash Standard
Hash Function
A message digest is as a
``digital fingerprint'' of the
original document
3
Chewing functions
Iam#4VKU Iam#4VKU
Password
store
h h
Hash Matching
Exactly?
Password
Yes No
store Deny
Grant
Topics
Overview of Cryptography Hash Function
Usages
Properties
Hashing Function Structure
Attack on Hash Function
The Road to new Secure Hash Standard
Hash Function Usages (I)
Fixed length L
This is a clear text that
can easily read without 52f21cf7c7034a20
using the key. The 17a21e17e061a863
sentence is longer than
the text above.
Kt is a constant value
S^t circular left shift of 32 bit sub-block by t bits
SHA round constants
Process F(t) in each SHA-1 round
2. Append
length
(64bits)
1. Append padding
bits
(to 448 mod 512)
40
Attacks on Hash Functions
brute-force attacks and cryptanalysis
cryptanalytic attacks exploit some property of algorithm so faster than brute-
force
a preimage or second preimage attack
find y such that H(y)equals a given hash value
collision resistance
find two messages x & y with same hash so H(x) = H(y)
"md5 and sha1 are both clearly broken (in terms of collision-resistance”
Ron Rivest
http://mail.python.org/pipermail/python-dev/2005-December/058850.html
The need of new Hash standard
MD5 should be considered cryptographically broken and
unsuitable for further use, US CERT 2010
In 2004, a collision for the full SHA-0 algorithm was
announced