High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
SHA-3 and Blockchain Security
1. Presenter: S a dja d Ta l akoo b
Email: s a dja d_talako ob97@cmps2.iust. a c.ir
N e twork S e curity by D r A k ba ri
D e c e m b e r - 2 0 1 9
Let’s Talk About Hash
2. What We Offer
0001
Crypto Hash Function
0010
Brief History
0011
Blockchain
0100
cryptocurrency
0101
Security in BC
0110
Hash in BC
0111
One more thing
1000
Conclusion
B.
1/20
3. Introduction
We Have Lots of Hash Fucntions - In compiler,web,Password,Spell checkers,Database,etc
We need only who related to Cryptography
2/20
4. Cryptographic Hash Function Properties
Quick
Computation
Should return the hash
output quickly
Avalanche
Effect
Small change in the
input, change the whole
output.
Determinestic
Always get the same
result with same data
Pre-Image
Resistance
Infeasible to determine
input data based on the
output hash.
3/20
5. Cryptographic Hash Function Properties
Collision Resistant
Each input has its own
unique hash.
Puzzle Friendly
Must be infeasible to find the
input from output and known
key
4/20
6. The collision
resistance is
effectively broken
Output size is limited,
vulnerable to length
extension attacks
Arbitrary length output,Sponge
Construction
The Brief History
SHA1
SHA2
KECCAK / SHA3
5/20
11. Cryptocurrency
• Cryptography has been a key technology in the financial
world for decades
• Bitcoin started in 2009
• Exploit advanced cryptographic techniques
• Today cryptography mostly secures point-to-point
interactions
10/20
16. One more thing
Merkle Tree
• Used in Cryptography and
computer science.
• Also called Hash tree.
• Every leaf node is labelled
with data block
• Every non-leaf node is
labelled with the
cryptographic hash of its
child node(s).
15/20
17. Ethereum – hash function
• Using the same
underlying
algorithm that
used in SHA-3.
• KECCAK-256
hash function-
FIPS202.
16/20
18. • Brief informations about Hash Fucntions.
• Why and How we use it in blockchain?
• Some new structures.
• Ehash from Ethereum
Conclusion
17/20
19. • Hahsing Data Structures-Ananda Gunawardena-2015.
• Security Aspects of Blockchain -ITU Workshop -2017.
• Farfalle: parallel permutation-based cryptography-Guido Bertoni Et al.-2018.
• Xoodoo cookbook-Joan Daemen Et al.-2018.
• Xoodyak, a lightweight cryptographic scheme- Joan Daemen Et al.-2018.
Some of My Resources
18/20
21. Any Question?
20/20
Presenter: S a dja d Ta l akoo b
Email: s a dja d_talako ob97@cmps2.iust. a c.ir
N e twork S e c urity by D r A k ba ri
D e c e m b e r - 2 0 1 9
این مکانیسم از جایگشتهای تصادفی برای جذب و خروج دادهها استفاده میکند و به عنوان منبعی تصادفی برای ورودیهای بعدی که وارد الگوریتم هشینگ میشوند هم فعالیت دارد
The blockchain is a distributed ledger platform withhigh Byzantine fault tolerance, which enables achieving consensus in a large decentralized network of parties who do not trust each other.
A paramount featureof blockchains is the accountability and transparency oftransactions, which makes it attractive for a variety ofapplications ranging from smart contracts and financeto manufacturing and healthcare
While promising for a wide range of applications, current blockchain platforms rely ondigital signatures, which are vulnerable to attacks by means of quantum computers.
One of the most prominent applications of blockchains is cryptocurrencies, such as Bitcoin .
The same, albeit to a lesser extent, applies to cryptographic hash functions that are used in preparing new blocks, so parties with access to quantum computation would have unfair advantage in procuring mining rewards.
‣ Many of these need advanced cryptographic protocols