SlideShare a Scribd company logo
1 of 16
Cryptographic Attack
Attacks and Analysis
Submitted By :
Md. Iftekhar Alam Efat
Lecturer
IIT , NSTU
Presented By :
Al Jaber (ASH1825029M)
Saifur Rahman(ASH1825031M)
Nadim Bhuiyan (ASH1825034M)
Contents
• Theme
• Literature Review
• Model
Introduction
 Cryptographic hash functions are one of the most important primitives in cryptography.
They are used in many applications, including digital signature schemes, MAC
algorithms, and PRNG.
 A hash function takes in arbitrary length of message and produces a fixed length output
called as the message digest. A hash function should follow the following properties.
(i) It is impossible to produce the message given the hash value.
(ii)No two messages should produce the same hash output(collision resistant).
(iii)It is impossible to modify the message without modifying the hash.
 Several types of Cryptographic hash functions are used :
 Grøstl
 SHA-1
 SHA-3
Literature Review
 Many cryptographic hash functions are use in many application such as digital
signature ,password etc. The discovery of the collision attacks on NIST’s
standard hash function SHA-1 , there is a strong need for a secure and
efficient hash function. In 2008, NIST launched the SHA-3 competition , in
2012. To analyze AES-type functions, several cryptanalytic techniques were
developed. In there they use the start-from-the-middle and the Super-Sbox
variants of the rebound technique to analyze the reduced-round Grøstl-224
and Grøstl-256 hash functions, compression function, and permutations.
A Short Description of Grøstl
 Grøstl is a cryptographic hash function. It uses the same S-box as AES in a custom
construction.
 The chaining values are 512-bit for Grøstl-224 and -256. They are stored as an 8 by 8
matrix whose elements are bytes.
 The compression function takes a 512-bit chaining value (CV) and a 512-bit message
block as inputs and generates a new 512-bit CV. The compression function uses two
permutations P and Q, with input length 512-bit.
x = CompGrøstl(y, z) = P(y ⊕ z) ⊕ Q(z) ⊕ y,
 A message is padded and divided into 512-bit message blocks m1, . . .,mb and processed
as follows to generate a hash value h, hi = f(hi−1, mi).
 The final output is (512 or 1024 bits).
SHA-1,Rebound ATTack
 SHA-1 is a cryptographic hash function which takes an input and produces a
160-bit (20-byte) hash value known as a message digest – typically rendered
as a hexadecimal number, 40 digits long.
 The rebound attack is a tool in the cryptanalysis of cryptographic hash
functions. It was conceived to attack AES like functions such
as Whirlpool and Grøstl. The Rebound Attack is a type of statistical attack
on hash functions, using techniques such as rotational and differential
cryptanalysis to find collisions
Pros & Cons
 Pros :
 making it harder for an attacker to break passwords
 making it harder for an attacker to digital signature
 making it harder for an attacker to verification code
 Cons :
Conclusion
We analyzed the Grøstl hash functions:
Using the start-from-the middle rebound technique, we have shown a collision attack on the
Grøstl-256 hash function reduced to 5 rounds and 6 rounds with 248 and 2112 time
complexities.
Furthermore, semi-free-start collision attacks on the Grøstl- 224 and -256 hash functions
reduced to 7 rounds, on the Grøstl-224 and -256 compression functions reduced to 8 rounds
were shown and some improvements of distinguishers of the permutations were presented.
While our analysis shows (semi-free-start) collision attacks for up to seven rounds which
leaves just three rounds of security margin, it does not pose a direct threat to the full Grøstl
hash or compression function.
Hull Click Human Identification Protocol
 This protocol is mainly about identification of human using
Convex Hull Algorithm.
 Using Convex Hull Algorithm, Human identification can be
collected.
Convex Hull Algorithm
 Mainly convex hull algorithm is about
some random points within a
exact area which is a polygon.
but specialty is the inner
angles wont be more a 180
degree.
 And the are must cover all the
other points.
 Using this algorithm human’s face or finger prints are detected.
face becomes divided into some points like, distance among eyes, nose, mouth or other
things.

Human identification protocol
CHC protocol
 C is the computer or the server that will detect the identification.
 H is the human, who is to be identified.
 C then repeats the process and accepts or rejects.
 Let there are n=30, m=25
Secret icons or labels are = {7, 15, 27, 30}
Attack-01
 The possibility of of getting secret label is:
 The possibility of getting non-secret labels is:
Cont…
 Simulation results for Attack 01 is like below:
Cont…
 Output of attacks 02..
Hash Function(Grostl) and Contex Hull Research paper

More Related Content

What's hot

Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decoding
ajithc0003
 

What's hot (20)

High Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter ModeHigh Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter Mode
 
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check MatrixLDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decoding
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
Distributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structureDistributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structure
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Network Coding
Network CodingNetwork Coding
Network Coding
 
Thesis_Presentation
Thesis_PresentationThesis_Presentation
Thesis_Presentation
 
Secure Hashing Techniques - Introduction
Secure Hashing Techniques - IntroductionSecure Hashing Techniques - Introduction
Secure Hashing Techniques - Introduction
 
My review on low density parity check codes
My review on low density parity check codesMy review on low density parity check codes
My review on low density parity check codes
 
A new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping setsA new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping sets
 
LDPC Encoding
LDPC EncodingLDPC Encoding
LDPC Encoding
 
LDPC
LDPCLDPC
LDPC
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
2 1
2 12 1
2 1
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
 
LDPC Codes
LDPC CodesLDPC Codes
LDPC Codes
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 

Similar to Hash Function(Grostl) and Contex Hull Research paper

Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
paperpublications3
 

Similar to Hash Function(Grostl) and Contex Hull Research paper (20)

Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for Snags
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 
Hash_Crypto.ppt
Hash_Crypto.pptHash_Crypto.ppt
Hash_Crypto.ppt
 
HASH FUNCTIONS.pdf
HASH FUNCTIONS.pdfHASH FUNCTIONS.pdf
HASH FUNCTIONS.pdf
 
Hash
HashHash
Hash
 
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
 
Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2
 
Cryptography-Hash-Functions.pptx
Cryptography-Hash-Functions.pptxCryptography-Hash-Functions.pptx
Cryptography-Hash-Functions.pptx
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 
Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.
 

More from SAIFUR RAHMAN (7)

DepenDNS Analysis
DepenDNS AnalysisDepenDNS Analysis
DepenDNS Analysis
 
Student Management System
Student Management SystemStudent Management System
Student Management System
 
Input & output
Input & outputInput & output
Input & output
 
Exception handling
Exception handlingException handling
Exception handling
 
Recommendation system
Recommendation systemRecommendation system
Recommendation system
 
Function
FunctionFunction
Function
 
Discrete math (sets)
Discrete math (sets)Discrete math (sets)
Discrete math (sets)
 

Recently uploaded

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Hash Function(Grostl) and Contex Hull Research paper

  • 2. Attacks and Analysis Submitted By : Md. Iftekhar Alam Efat Lecturer IIT , NSTU Presented By : Al Jaber (ASH1825029M) Saifur Rahman(ASH1825031M) Nadim Bhuiyan (ASH1825034M)
  • 4. Introduction  Cryptographic hash functions are one of the most important primitives in cryptography. They are used in many applications, including digital signature schemes, MAC algorithms, and PRNG.  A hash function takes in arbitrary length of message and produces a fixed length output called as the message digest. A hash function should follow the following properties. (i) It is impossible to produce the message given the hash value. (ii)No two messages should produce the same hash output(collision resistant). (iii)It is impossible to modify the message without modifying the hash.  Several types of Cryptographic hash functions are used :  Grøstl  SHA-1  SHA-3
  • 5. Literature Review  Many cryptographic hash functions are use in many application such as digital signature ,password etc. The discovery of the collision attacks on NIST’s standard hash function SHA-1 , there is a strong need for a secure and efficient hash function. In 2008, NIST launched the SHA-3 competition , in 2012. To analyze AES-type functions, several cryptanalytic techniques were developed. In there they use the start-from-the-middle and the Super-Sbox variants of the rebound technique to analyze the reduced-round Grøstl-224 and Grøstl-256 hash functions, compression function, and permutations.
  • 6. A Short Description of Grøstl  Grøstl is a cryptographic hash function. It uses the same S-box as AES in a custom construction.  The chaining values are 512-bit for Grøstl-224 and -256. They are stored as an 8 by 8 matrix whose elements are bytes.  The compression function takes a 512-bit chaining value (CV) and a 512-bit message block as inputs and generates a new 512-bit CV. The compression function uses two permutations P and Q, with input length 512-bit. x = CompGrøstl(y, z) = P(y ⊕ z) ⊕ Q(z) ⊕ y,  A message is padded and divided into 512-bit message blocks m1, . . .,mb and processed as follows to generate a hash value h, hi = f(hi−1, mi).  The final output is (512 or 1024 bits).
  • 7. SHA-1,Rebound ATTack  SHA-1 is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as a hexadecimal number, 40 digits long.  The rebound attack is a tool in the cryptanalysis of cryptographic hash functions. It was conceived to attack AES like functions such as Whirlpool and Grøstl. The Rebound Attack is a type of statistical attack on hash functions, using techniques such as rotational and differential cryptanalysis to find collisions
  • 8. Pros & Cons  Pros :  making it harder for an attacker to break passwords  making it harder for an attacker to digital signature  making it harder for an attacker to verification code  Cons :
  • 9. Conclusion We analyzed the Grøstl hash functions: Using the start-from-the middle rebound technique, we have shown a collision attack on the Grøstl-256 hash function reduced to 5 rounds and 6 rounds with 248 and 2112 time complexities. Furthermore, semi-free-start collision attacks on the Grøstl- 224 and -256 hash functions reduced to 7 rounds, on the Grøstl-224 and -256 compression functions reduced to 8 rounds were shown and some improvements of distinguishers of the permutations were presented. While our analysis shows (semi-free-start) collision attacks for up to seven rounds which leaves just three rounds of security margin, it does not pose a direct threat to the full Grøstl hash or compression function.
  • 10. Hull Click Human Identification Protocol  This protocol is mainly about identification of human using Convex Hull Algorithm.  Using Convex Hull Algorithm, Human identification can be collected.
  • 11. Convex Hull Algorithm  Mainly convex hull algorithm is about some random points within a exact area which is a polygon. but specialty is the inner angles wont be more a 180 degree.  And the are must cover all the other points.  Using this algorithm human’s face or finger prints are detected. face becomes divided into some points like, distance among eyes, nose, mouth or other things. 
  • 12. Human identification protocol CHC protocol  C is the computer or the server that will detect the identification.  H is the human, who is to be identified.  C then repeats the process and accepts or rejects.  Let there are n=30, m=25 Secret icons or labels are = {7, 15, 27, 30}
  • 13. Attack-01  The possibility of of getting secret label is:  The possibility of getting non-secret labels is:
  • 14. Cont…  Simulation results for Attack 01 is like below:
  • 15. Cont…  Output of attacks 02..