Your SlideShare is downloading. ×
  • Like
從泛民初選 探討Hash保安
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

從泛民初選 探討Hash保安

  • 53 views
Published

 

Published in Technology , Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
53
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
1
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. 從泛民初選 探討HASH保安
  • 2. Hash Function Can be applied to a block of data of any size ●produce a fixed-length output ●relatively easy to compute of any given value, making both hardware and software implementations practical ●
  • 3. Hash Function For any given hash code h, it is computationally infeasible to find x such that H(x) = h. We called it one-way property ●
  • 4. Hash Function For any given block x, it is computationally infeasible to find y <> x with H(y) = H(x). This is referred to as weak collision resistance. ●
  • 5. Hash Function It is computationally infeasible to find any pair (x, y) such that H(x) = H(y). It is referred to as string collision resistance. ●
  • 6. Usage Password Protection ●As a fingerprint of a message, data or file (Checksum) ●Data Normalization (ID Generation) ●
  • 7. Common Cracking Pattern Finding ●Birthday Attack ●Dictionary Attack ●
  • 8. Solution publish the method and open the source for all people to review. ●increase the length of the hash code. ●add salt ●
  • 9. Possible Cracking of HKID Hash Code Server had been cracked ●Dictionary Attack ●man in middle (Depends on the Design) ●Virus ●Key Logger ●Binary or source code disclose ●
  • 10. Workshop openssl ●md5sum ●shasum ●Fun on cracking my 30000 hash codes ●