This document discusses message authentication techniques including message encryption, message authentication codes (MACs), and hash functions. It describes how each technique can be used to authenticate messages and protect against various security threats. It also covers how symmetric and asymmetric encryption can provide authentication when used with MACs or digital signatures. Specific MAC and hash functions are examined like HMAC, SHA-1, and SHA-2. X.509 is introduced as a standard for digital certificates.
Message authentication and hash functionomarShiekh1
The document discusses message authentication and hash functions. It covers security requirements including integrity, authentication and non-repudiation. It describes different authentication functions such as message encryption, message authentication codes (MACs), and hash functions. It provides examples of how hash functions work and evaluates the security of hash functions and MACs against brute force and cryptanalytic attacks.
S/MIME (Secure Multipurpose Internet Mail Extensions) allows users to securely send emails through encryption and digital signatures. It uses public key cryptography, with algorithms like RSA and ElGamal for encryption and DSS and RSA for digital signatures. S/MIME supports encrypting the message contents, digitally signing the message, or both. It defines new MIME types to implement these security features for email. Other technologies like PGP provide similar email security functionality to S/MIME.
This document discusses cryptographic hash functions including their applications in message authentication and digital signatures. It describes the requirements for hash functions to be secure including resistance to brute force attacks and cryptanalysis. The document outlines some simple hash functions and provides details on the Secure Hash Algorithm (SHA) family of cryptographic hash functions used in standards like SHA-512 which operates on 1024-bit blocks through 80 rounds. It also mentions NIST's selection of the Keccak algorithm as the new SHA-3 standard.
An introduction to asymmetric cryptography with an in-depth look at RSA, Diffie-Hellman, the FREAK and LOGJAM attacks on TLS/SSL, and the "Mining your P's and Q's attack".
Key management is the set of techniques and procedures for establishing and maintaining secure key relationships between parties. It involves generating, distributing, storing, updating, and revoking cryptographic keys. The objectives of key management are to maintain secure keying material and relationships to counter relevant threats like key compromise, in accordance with a security policy. Techniques include symmetric and public-key encryption, key hierarchies, certificates, and life cycle processes around user registration and key installation, update, and destruction.
MD5 is a cryptographic hash function that produces a 128-bit hash value for a message of any length. It was originally designed to provide authentication of digital signatures but is no longer considered reliable for cryptography due to techniques that can generate collisions. MD5 operates by padding the input, appending the length, dividing into blocks, initializing variables, processing blocks through 4 rounds of operations with different constants each round, and outputting the hash value. While it was intended to be difficult to find collisions or recover the input, MD5 is no longer considered cryptographically secure due to attacks demonstrating collisions.
The document discusses hash functions and message authentication codes (MACs). It begins by defining hash functions and MACs, noting that hash functions generate a fingerprint for a message without a key while MACs use a keyed hash function. It then covers security requirements for hash functions like one-wayness and collision resistance. Popular hash functions are described like MD5, SHA-1, and the SHA-2 family. Constructions for hash functions based on block ciphers and iterated hash functions are also outlined. The document concludes by comparing hash functions and MACs and describing common MAC constructions.
This document discusses message authentication techniques including message encryption, message authentication codes (MACs), and hash functions. It describes how each technique can be used to authenticate messages and protect against various security threats. It also covers how symmetric and asymmetric encryption can provide authentication when used with MACs or digital signatures. Specific MAC and hash functions are examined like HMAC, SHA-1, and SHA-2. X.509 is introduced as a standard for digital certificates.
Message authentication and hash functionomarShiekh1
The document discusses message authentication and hash functions. It covers security requirements including integrity, authentication and non-repudiation. It describes different authentication functions such as message encryption, message authentication codes (MACs), and hash functions. It provides examples of how hash functions work and evaluates the security of hash functions and MACs against brute force and cryptanalytic attacks.
S/MIME (Secure Multipurpose Internet Mail Extensions) allows users to securely send emails through encryption and digital signatures. It uses public key cryptography, with algorithms like RSA and ElGamal for encryption and DSS and RSA for digital signatures. S/MIME supports encrypting the message contents, digitally signing the message, or both. It defines new MIME types to implement these security features for email. Other technologies like PGP provide similar email security functionality to S/MIME.
This document discusses cryptographic hash functions including their applications in message authentication and digital signatures. It describes the requirements for hash functions to be secure including resistance to brute force attacks and cryptanalysis. The document outlines some simple hash functions and provides details on the Secure Hash Algorithm (SHA) family of cryptographic hash functions used in standards like SHA-512 which operates on 1024-bit blocks through 80 rounds. It also mentions NIST's selection of the Keccak algorithm as the new SHA-3 standard.
An introduction to asymmetric cryptography with an in-depth look at RSA, Diffie-Hellman, the FREAK and LOGJAM attacks on TLS/SSL, and the "Mining your P's and Q's attack".
Key management is the set of techniques and procedures for establishing and maintaining secure key relationships between parties. It involves generating, distributing, storing, updating, and revoking cryptographic keys. The objectives of key management are to maintain secure keying material and relationships to counter relevant threats like key compromise, in accordance with a security policy. Techniques include symmetric and public-key encryption, key hierarchies, certificates, and life cycle processes around user registration and key installation, update, and destruction.
MD5 is a cryptographic hash function that produces a 128-bit hash value for a message of any length. It was originally designed to provide authentication of digital signatures but is no longer considered reliable for cryptography due to techniques that can generate collisions. MD5 operates by padding the input, appending the length, dividing into blocks, initializing variables, processing blocks through 4 rounds of operations with different constants each round, and outputting the hash value. While it was intended to be difficult to find collisions or recover the input, MD5 is no longer considered cryptographically secure due to attacks demonstrating collisions.
The document discusses hash functions and message authentication codes (MACs). It begins by defining hash functions and MACs, noting that hash functions generate a fingerprint for a message without a key while MACs use a keyed hash function. It then covers security requirements for hash functions like one-wayness and collision resistance. Popular hash functions are described like MD5, SHA-1, and the SHA-2 family. Constructions for hash functions based on block ciphers and iterated hash functions are also outlined. The document concludes by comparing hash functions and MACs and describing common MAC constructions.
Pretty Good Privacy (PGP) is strong encryption software that enables you to protect your email and files by scrambling them so others cannot read them. It also allows you to digitally "sign" your messages in a way that allows others to verify that a message was actually sent by you. PGP is available in freeware and commercial versions all over the world.
PGP was first released in 1991 as a DOS program that earned a reputation for being difficult. In June 1997, PGP Inc. released PGP 5.x for Win95/NT. PGP 5.x included plugins for several popular email programs.
Symmetric Key Encryption Algorithms can be categorized as stream ciphers or block ciphers. Block ciphers like the Data Encryption Standard (DES) operate on fixed-length blocks of bits, while stream ciphers process messages bit-by-bit. DES is an example of a block cipher that encrypts 64-bit blocks using a 56-bit key. International Data Encryption Algorithm (IDEA) is another block cipher that uses a 128-bit key and 64-bit blocks, employing addition and multiplication instead of XOR like DES. IDEA consists of 8 encryption rounds followed by an output transformation to generate the ciphertext from the plaintext and key.
This document discusses message authentication codes (MACs). It explains that MACs use a shared symmetric key to authenticate messages, ensuring integrity and validating the sender. The document outlines the MAC generation and verification process, and notes that MACs provide authentication but not encryption. It then describes HMAC specifically, which applies a cryptographic hash function to the message and key to generate the MAC. The key steps of the HMAC process are detailed.
Key management: Introduction, How public key distribution done, Diffie Hellman Key Exchage Algorithm,Digital Certificate. Key Management using Digital certificate is done etc. wireshark screenshot showing digital cetificate.
This document discusses cryptographic hash functions. It defines hashing as transforming a variable length string into a shorter, fixed length value. Cryptographic hash functions are designed to be one-way and resistant to tampering. They are important for security applications like digital signatures, message authentication and password verification. Commonly used hash functions include MD5 and SHA-1 which take arbitrary inputs and produce fixed-length outputs.
Pgp-Pretty Good Privacy is the open source freely available tool to encrypt your emails then you can very securely send mails to others over internet without fear of eavesdropping by cryptanalyst.
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
A hash algorithm is a one-way function that converts a data string into a numeric string output of fixed length. It is collision resistant, meaning it is very unlikely for different data to produce the same hash value. Common hash algorithms include MD5 and SHA-1. A one-way hash function takes a variable-length input and produces a fixed-length output. It is easy to compute the hash but very difficult to reverse it or find collisions. Hash functions are used for password verification, digital signatures, and ensuring data integrity.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
The document discusses key concepts in public key infrastructure (PKI) including X.509 certificates, certification authorities, certificate hierarchies, and certificate extensions.
It describes how X.509 certificates contain a user's public key and identification information that is digitally signed by a certification authority. Certification authorities issue and manage certificates according to PKI organization models like strict hierarchies and cross-certification. Certificate revocation lists are used to invalidate compromised certificates. The document outlines authentication protocols using digital signatures and discusses extensions that provide additional certificate information.
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
A hash function usually means a function that compresses, meaning the output is shorter than the input
A hash function takes a group of characters (called a key) and maps it to a value of a certain length (called a hash value or hash).
The hash value is representative of the original string of characters, but is normally smaller than the original.
This term is also known as a hashing algorithm or message digest function.
Hash functions also called message digests or one-way encryption or hashing algorithm.
http://phpexecutor.com
- DES (Data Encryption Standard) is a symmetric block cipher algorithm that encrypts data in 64-bit blocks using a 56-bit key. It was the first encryption standard adopted by the U.S. government for protecting sensitive unclassified federal government information.
- DES works by performing 16 rounds of complex substitutions and permutations on each data block, encrypting it using the key. It has various modes of operation like ECB, CBC, CFB, OFB, and CTR that specify how it operates on data.
- In 1998, DES was broken using a brute force attack by the Electronic Frontier Foundation in just 3 days, showing the need for stronger algorithms like AES which replaced DES as the encryption standard
this presentation is on block cipher modes which are used for encryption and decryption to any message.That are Defined by the National Institute of Standards and Technology . Block cipher modes of operation are part of symmetric key encryption algorithm.
i hope you may like this.
Symmetric encryption uses the same key to encrypt and decrypt data, providing confidentiality. Keys must be distributed securely between parties. Common approaches involve using a key distribution center (KDC) that shares secret keys with parties and can provide temporary session keys. Link encryption protects data as it travels over each network link, while end-to-end encryption protects data for its entire journey but leaves some header data unencrypted. Key distribution, storage, renewal and replacement are important aspects of maintaining security when using symmetric encryption.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
The transport layer provides efficient, reliable, and cost-effective process-to-process delivery by making use of network layer services. The transport layer works through transport entities to achieve its goal of reliable delivery between application processes. It provides an interface for applications to access its services.
secure hash function for authentication in CNSNithyasriA2
Cryptographic hash functions are used for message authentication, digital signatures, and other applications. They must be resistant to preimage, second preimage, and collision attacks. Popular hash functions include SHA-1, SHA-2 (SHA-256, SHA-384, SHA-512), and the new standard SHA-3. SHA-3 uses a sponge construction that partitions inputs into blocks processed sequentially by an iteration function f to produce an output block. This provides resistance against cryptanalysis attacks on previous hash functions.
Cryptography and Network Security Principles and Practice.docxrichardnorman90310
This document provides an overview of cryptographic hash functions. It defines hash functions and their key properties like one-wayness and collision resistance. It describes common hash functions like SHA-1, SHA-2 (SHA-256, SHA-384 etc.), and the new SHA-3 standard. It explains how hash functions are used for message authentication codes (MACs), digital signatures, password storage and other applications. It also discusses attacks on hash functions like brute force and birthday paradox attacks.
Pretty Good Privacy (PGP) is strong encryption software that enables you to protect your email and files by scrambling them so others cannot read them. It also allows you to digitally "sign" your messages in a way that allows others to verify that a message was actually sent by you. PGP is available in freeware and commercial versions all over the world.
PGP was first released in 1991 as a DOS program that earned a reputation for being difficult. In June 1997, PGP Inc. released PGP 5.x for Win95/NT. PGP 5.x included plugins for several popular email programs.
Symmetric Key Encryption Algorithms can be categorized as stream ciphers or block ciphers. Block ciphers like the Data Encryption Standard (DES) operate on fixed-length blocks of bits, while stream ciphers process messages bit-by-bit. DES is an example of a block cipher that encrypts 64-bit blocks using a 56-bit key. International Data Encryption Algorithm (IDEA) is another block cipher that uses a 128-bit key and 64-bit blocks, employing addition and multiplication instead of XOR like DES. IDEA consists of 8 encryption rounds followed by an output transformation to generate the ciphertext from the plaintext and key.
This document discusses message authentication codes (MACs). It explains that MACs use a shared symmetric key to authenticate messages, ensuring integrity and validating the sender. The document outlines the MAC generation and verification process, and notes that MACs provide authentication but not encryption. It then describes HMAC specifically, which applies a cryptographic hash function to the message and key to generate the MAC. The key steps of the HMAC process are detailed.
Key management: Introduction, How public key distribution done, Diffie Hellman Key Exchage Algorithm,Digital Certificate. Key Management using Digital certificate is done etc. wireshark screenshot showing digital cetificate.
This document discusses cryptographic hash functions. It defines hashing as transforming a variable length string into a shorter, fixed length value. Cryptographic hash functions are designed to be one-way and resistant to tampering. They are important for security applications like digital signatures, message authentication and password verification. Commonly used hash functions include MD5 and SHA-1 which take arbitrary inputs and produce fixed-length outputs.
Pgp-Pretty Good Privacy is the open source freely available tool to encrypt your emails then you can very securely send mails to others over internet without fear of eavesdropping by cryptanalyst.
The presentation include:
-Diffie hellman key exchange algorithm
-Primitive roots
-Discrete logarithm and discrete logarithm problem
-Attacks on diffie hellman and their possible solution
-Key distribution center
A hash algorithm is a one-way function that converts a data string into a numeric string output of fixed length. It is collision resistant, meaning it is very unlikely for different data to produce the same hash value. Common hash algorithms include MD5 and SHA-1. A one-way hash function takes a variable-length input and produces a fixed-length output. It is easy to compute the hash but very difficult to reverse it or find collisions. Hash functions are used for password verification, digital signatures, and ensuring data integrity.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
The document discusses key concepts in public key infrastructure (PKI) including X.509 certificates, certification authorities, certificate hierarchies, and certificate extensions.
It describes how X.509 certificates contain a user's public key and identification information that is digitally signed by a certification authority. Certification authorities issue and manage certificates according to PKI organization models like strict hierarchies and cross-certification. Certificate revocation lists are used to invalidate compromised certificates. The document outlines authentication protocols using digital signatures and discusses extensions that provide additional certificate information.
A brief discussion of network security and an introduction to cryptography. We end the presentation with a discussion of the RSA algorithm, and show how it works with a basic example.
A hash function usually means a function that compresses, meaning the output is shorter than the input
A hash function takes a group of characters (called a key) and maps it to a value of a certain length (called a hash value or hash).
The hash value is representative of the original string of characters, but is normally smaller than the original.
This term is also known as a hashing algorithm or message digest function.
Hash functions also called message digests or one-way encryption or hashing algorithm.
http://phpexecutor.com
- DES (Data Encryption Standard) is a symmetric block cipher algorithm that encrypts data in 64-bit blocks using a 56-bit key. It was the first encryption standard adopted by the U.S. government for protecting sensitive unclassified federal government information.
- DES works by performing 16 rounds of complex substitutions and permutations on each data block, encrypting it using the key. It has various modes of operation like ECB, CBC, CFB, OFB, and CTR that specify how it operates on data.
- In 1998, DES was broken using a brute force attack by the Electronic Frontier Foundation in just 3 days, showing the need for stronger algorithms like AES which replaced DES as the encryption standard
this presentation is on block cipher modes which are used for encryption and decryption to any message.That are Defined by the National Institute of Standards and Technology . Block cipher modes of operation are part of symmetric key encryption algorithm.
i hope you may like this.
Symmetric encryption uses the same key to encrypt and decrypt data, providing confidentiality. Keys must be distributed securely between parties. Common approaches involve using a key distribution center (KDC) that shares secret keys with parties and can provide temporary session keys. Link encryption protects data as it travels over each network link, while end-to-end encryption protects data for its entire journey but leaves some header data unencrypted. Key distribution, storage, renewal and replacement are important aspects of maintaining security when using symmetric encryption.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
The transport layer provides efficient, reliable, and cost-effective process-to-process delivery by making use of network layer services. The transport layer works through transport entities to achieve its goal of reliable delivery between application processes. It provides an interface for applications to access its services.
secure hash function for authentication in CNSNithyasriA2
Cryptographic hash functions are used for message authentication, digital signatures, and other applications. They must be resistant to preimage, second preimage, and collision attacks. Popular hash functions include SHA-1, SHA-2 (SHA-256, SHA-384, SHA-512), and the new standard SHA-3. SHA-3 uses a sponge construction that partitions inputs into blocks processed sequentially by an iteration function f to produce an output block. This provides resistance against cryptanalysis attacks on previous hash functions.
Cryptography and Network Security Principles and Practice.docxrichardnorman90310
This document provides an overview of cryptographic hash functions. It defines hash functions and their key properties like one-wayness and collision resistance. It describes common hash functions like SHA-1, SHA-2 (SHA-256, SHA-384 etc.), and the new SHA-3 standard. It explains how hash functions are used for message authentication codes (MACs), digital signatures, password storage and other applications. It also discusses attacks on hash functions like brute force and birthday paradox attacks.
This document provides an overview of message authentication and integrity. It discusses the need for authentication in network security and outlines different authentication functions including message encryption, message authentication codes (MACs), and hash functions. It describes how MACs are generated using a secret key and message and provides the requirements for MACs. The document also discusses the MD5 and SHA hash algorithms, explaining their processes and analyzing their security strengths and weaknesses.
This material covers Authentication requirement, Authentication function, MAC, Hash function, Security of hash function and MAC, SHA, Digital signature and authentication protocols, DSS, Authentication protocols like Kerberos and X.509, entity authentication
Information and data security cryptographic hash functionsMazin Alwaaly
This document discusses hash functions and their cryptographic applications. It begins by defining hash functions and their properties like one-wayness and collision resistance. It then discusses various applications of cryptographic hash functions like message authentication codes, digital signatures, password files, and more. It provides details on how hash functions are used for message authentication and digital signatures. It also describes the Secure Hash Algorithm family of hash functions like SHA-1, SHA-2, and the NIST competition for the SHA-3 standard.
This document discusses message authentication and hash functions. It begins by defining message authentication and its security requirements. It then describes three approaches to message authentication: message encryption, message authentication codes (MACs), and hash functions. It provides details on how MACs and hash functions work, including properties and requirements. Specific algorithms like MD5 are also covered. The document aims to explain the concepts and tradeoffs between different message authentication techniques.
This document discusses message authentication techniques. It describes message authentication codes (MACs) which use a secret key to generate a code appended to messages to verify authenticity and integrity. Hash functions can also provide authentication but do not use a secret key. HMAC is introduced as a technique that incorporates a secret key into existing hash functions like SHA-1/2 to create a MAC. Digital signatures, which encrypt a hash of a message with a private key, providing both authentication and non-repudiation, are also discussed.
UNIT3_class (1).ppt CRYPTOGRAPHY NOTES AND NETWORKjeevasreemurali
This document discusses authentication techniques including message authentication codes (MACs) and hash functions. It provides details on:
1. MACs generate a signature for a message to validate authenticity and integrity. Common MAC algorithms discussed are HMAC and CMAC.
2. Hash functions condense messages to fixed lengths. Popular hash functions discussed are MD5, SHA, and their design and security properties.
3. Digital signatures combine hash functions with asymmetric encryption to provide authentication, integrity, and non-repudiation. Signature protocols like DSS are mentioned.
This document discusses techniques for distributing public keys and Hash-based Message Authentication Code (HMAC). It begins with an overview of public key cryptography and the need for secure key distribution. It then describes several approaches for distributing public keys, including using a public key authority, public key certificates, and a publicly available directory. The document also provides background on HMAC, describing how it uses cryptographic hash functions and a secret key to authenticate messages and ensure integrity. It includes the HMAC algorithm details, parameters, and a graphical representation of the process.
Cryptographic hash functions are used for message authentication, digital signatures, and other applications. They take a variable-length input and produce a fixed-length output. Secure Hash Algorithm (SHA) is a cryptographic hash function designed by the National Institute of Standards and Technology. SHA-1 produces a 160-bit hash. SHA-2 includes SHA-256, SHA-384, and SHA-512, which produce hashes of 256, 384, and 512 bits respectively. SHA-512 processes the message in 1024-bit blocks through 80 rounds, updating buffer values in each round using a 64-bit value derived from the block and an additive constant.
The document provides an overview of public key encryption and related concepts. It discusses how public key encryption uses key pairs (public and private keys) to securely encrypt and decrypt messages. The main public key encryption algorithms covered are RSA, ElGamal, and elliptic curve cryptography. The document also discusses hash functions and their uses in message integrity and digital signatures. Common hashing algorithms like SHA, MD2, MD4, and MD5 are explained. The use of encryption for network security is covered, including IPsec, ISAKMP, and wireless security protocols like WEP and WPA/WPA2. Finally, various types of cryptographic attacks are defined.
This document provides an overview of asymmetric cryptography, including its history and key concepts. It discusses how asymmetric cryptography uses key pairs, with one key kept private and one shared publicly. Common asymmetric algorithms are described such as RSA, Diffie-Hellman, El Gamal, and Elliptic Curve Cryptography. The document also covers hashing, message authentication codes, digital signatures, and key management considerations.
Hash functions are mathematical functions that compress an input of arbitrary length into a fixed-length output called a hash value. They have several key properties including:
- Fixed length output regardless of input size
- Fast computation of hash values
- Pre-image, second pre-image, and collision resistance, making it difficult to derive the input data from its hash or find two inputs with the same hash
Common applications of hash functions include password storage by storing hashed passwords rather than plaintext, and data integrity checks by comparing hashed files to detect unauthorized changes. Popular hash functions are MD5, SHA-1/2, RIPEMD, and Whirlpool.
This document discusses hash functions and their analysis for a network security seminar. It begins by defining a hash function as a mathematical function that converts a large amount of data into a small string of integers. Common applications of hash functions include hash tables for quickly searching data, eliminating data redundancy, caches, bloom filters, and pattern matching. Cryptographic hash functions have properties like preimage and second preimage resistance as well as collision resistance. Popular cryptographic hash functions discussed include MD2, MD4, MD5, SHA-1, and SHA-2, along with their advantages, limitations, and examples of attacks.
unit 4.pptx of hash function in cryptographyNithyasriA2
This document discusses cryptographic hash functions and their applications. It provides 3 key points:
1. Cryptographic hash functions are algorithms that take a variable-length input and produce a fixed-length output (hash value) that uniquely identifies the input. They have properties of one-wayness and collision resistance.
2. Hash functions have important applications in message authentication, digital signatures, and password protection by providing a means to verify message integrity and authenticity.
3. The security of cryptographic hash functions depends on their resistance to brute-force attacks and cryptanalysis. Attacks aim to find collisions or preimages more efficiently than brute force search. Iterated hash functions are most commonly used due to their security
This document discusses cryptographic hash functions and their applications in message authentication and digital signatures. It begins by defining hash functions and their properties, such as producing a fixed-size output from a variable-length input. It then discusses cryptographic hash functions and their security properties like one-wayness and collision resistance. Applications like message authentication using hash functions and digital signatures by encrypting a hash with a private key are covered. Finally, it discusses requirements and analysis of hash functions.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Information and network security 38 birthday attacks and security of hash fun...Vaibhav Khanna
Birthday attack can be used in communication abusage between two or more parties. ... The mathematics behind this problem led to a well-known cryptographic attack called the birthday attack, which uses this probabilistic model to reduce the complexity of cracking a hash function
Cryptography and Message Authentication NS3koolkampus
This document provides an overview of approaches to message authentication and public-key cryptography. It discusses secure hash functions like SHA-1 and HMAC for message authentication codes. For public-key cryptography, it describes the principles including key distribution and encryption/decryption with public/private key pairs. Specific public-key algorithms covered are RSA, Diffie-Hellman key exchange, and their applications for encryption, digital signatures, and key exchange. Requirements and examples of the RSA algorithm are also summarized.
Similar to Public Key Encryption & Hash functions (20)
Introduction to Cloud
Definition
Vision on Cloud Computing
A Closer Look-NewYork Times, Washington Post, private cloud,Public Cloud, Hybrid Cloud, Reference Model, Actors in Cloud Computing, Characteristics and Benefits, Challenges Ahead, History of Cloud Computing, Distributed system, Virtualization, PROS and CONS of Cloud Computing. Technology Examples
M. Florence Dayana - Hadoop Foundation for Analytics.pptxDr.Florence Dayana
Hadoop Foundation for Analytics
History of Hadoop
Features of Hadoop
Key Advantages of Hadoop
Why Hadoop
Versions of Hadoop
Eco Projects
Essential of Hadoop ecosystem
RDBMS versus Hadoop
Key Aspects of Hadoop
Components of Hadoop
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfDr.Florence Dayana
Logic Gates, Truth Table, AND Gate
Types of Digital Logic AND Gate, The 2-input and 3-input AND Gate, OR Gate, Types of Digital Logic AND Gate, The 2-input OR gate, The 3-input OR gate, NOT Gate, NAND Gate, The 2-input NAND Gate, The 3-input NAND Gate, NOR Gate, 2-input NOR gate
Just like other gates, XOR gate or Exclusive-OR gate
Reading, Pre Task, Reading Strategies, Types of reading, Reading Comprehension, Questions, Comparison, Group Discussion, Identify the Meaning, positive vibration, vocabulary
Listening, form of communication, Process Description, Definition, Model Video for Listening, Questions, Procedure for Flowchart, Pre Listening, Post Listening, Motivational video, comparison video
Input Devices-Keyboard, Mouse, Trackball, Joystick, Scanner and Types, Barcode Reader, Voice Recognition, Web Camera, Optical character recognition, Optical Mark recognition, Monitor, Printer and Types, Plotter
Secure Electronic Transaction (SET) was a protocol standard for securing credit card transactions over the internet. It involved companies like MasterCard, Visa, IBM and provided a secure communication channel and digital certificates to ensure privacy and trust. The SET process involved customers getting certificates and placing orders with merchants who also had certificates. The merchant would then request payment authorization from the bank. Dual signatures were used to link messages between customers, merchants and banks for security. Payment gateways verified certificates and digital signatures and requested authorizations from card issuers.
Definition, SSL Concepts Connection and Service, SSL Architecture, SSL Record Protocol, Record Format, Higher Layer Protocol, Handshake Protocol- Change Cipher Specification and lert Protocol
Introduction, networking, types of network, connections, packet switching, open systems, protocols, firewalls, mime types, addresses, domain name system
The document provides an overview of database management systems (DBMS). It discusses the history of DBMS beginning in the early 1960s. It also covers data models like hierarchical, network, relational, object-oriented, and deductive. The document describes the architecture and components of a DBMS. It lists advantages like data independence and security as well as disadvantages such as costs. Key concepts covered include data storage, processing, and retrieval.
Big data analytics (BDA) provides capabilities for revealing additional value from big data. It examines large amounts of data from various sources to deliver insights that enable real-time decisions. BDA is different from data warehousing and business intelligence systems. The complexity of big data systems required developing specialized architectures like Hadoop, which processes large amounts of data in a timely and low cost manner. Big data challenges include capturing, storing, analyzing, sharing, transferring, visualizing, querying, updating, and ensuring privacy of large and diverse datasets.
This document provides an overview of key concepts in information security. It defines security, outlines different types of security including physical security and network security. It also defines basic terminologies used in cryptography like plaintext, ciphertext, cipher, key, encrypt, decrypt, cryptography, and cryptanalysis. It then discusses computer security, network security, and internet security. It outlines critical characteristics of information and principles of access control. It also provides examples of different security requirements and services. It discusses challenges in computer security and considers aspects of security including security attacks, mechanisms, and services. It also provides examples of different types of passive and active security attacks. Finally, it outlines models for network security and network access security.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
Public Key Encryption & Hash functions
1. NETWORK SECURITY
Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D).,
Head, Dept. of CA
Bon Secours College For Women
Thanjavur.
Class : II MSc., CS
Semester : III
Unit : III
Topic : Public key Encryption and Hash Functions
2/15/20191
2. public-key Encryption
Public-key encryption is a cryptographic system that uses
two keys -- a public key known to everyone and
a private or secret key known only to the recipient of the
message.
Example: When John wants to send a secure message to Jane,
he uses Jane's public key to encrypt the message. Jane then
uses her private key to decrypt it.
An important element to the public key system is that the public
and private keys are related in such a way that only the public
key can be used to encrypt messages and only the
corresponding private key can be used to decrypt them.
Moreover, it is virtually impossible to deduce the private key if you
know the public key.
3. Public key encryption is a form of encryption that uses two
keys.
A public key, which everyone knows, and a private key, which
only you know.
To encrypt, the public key is applied to the target information,
using a predefined operation (several times), to produce a
pseudo-random number.
To decrypt, the private key is applied to the pseudo-random
number, using a different predefined operation (several times),
to get the target information back.
The algorithm relies on the fact that encryption is easy, and
decryption is hard, making decryption impractical without the
key.
It was the first system to allow secure information transfer,
without a shared Key.
4. Hash Functions
• A hash function H accepts a variable-length block
of data M as input and produces a fixed-size hash
value
• h = H(M)
• Principal object is data integrity
• Cryptographic hash function
• An algorithm for which it is computationally
infeasible to find either:
(a) a data object that maps to a pre-specified hash
result (the one-way property)
(b) two data objects that map to the same hash result
(the collision-free property)
5.
6.
7.
8. Message Authentication Code
(MAC)
• Also known as a keyed hash function
• Typically used between two parties that share a
secret key to authenticate information exchanged
between those parties
Takes as input a secret key and a data block and produces a
hash value (MAC) which is associated with the protected
message
•If the integrity of the message needs to be checked, the MAC
function can be applied to the message and the result
compared with the associated MAC value
•An attacker who alters the message will be unable to alter the
associated MAC value without knowledge of the secret key
9. Digital Signature
• Operation is similar to that of the MAC
• The hash value of a message is encrypted with a
user’s private key
• Anyone who knows the user’s public key can
verify the integrity of the message
• An attacker who wishes to alter the message
would need to know the user’s private key
• Implications of digital signatures go beyond just
message authentication
10.
11. Other Hash Function Uses
Commonly used to create
a one-way password file
When a user enters a
password, the hash of
that password is
compared to the stored
hash value for
verification
This approach to
password protection is
used by most operating
systems
Can be used for intrusion
and virus detection
Store H(F) for each file
on a system and secure
the hash values
One can later determine
if a file has been
modified by
recomputing H(F)
An intruder would need
to change F without
changing H(F)
Can be used to construct
a pseudorandom function
(PRF) or a pseudorandom
number generator (PRNG)
A common application
for a hash-based PRF is
for the generation of
symmetric keys
12. Two Simple Hash Functions
• Consider two simple insecure hash functions that operate
using the following general principles:
• The input is viewed as a sequence of n-bit blocks
• The input is processed one block at a time in an iterative fashion
to produce an n-bit hash function
• Bit-by-bit exclusive-OR (XOR) of every block
• Ci = bi1 xor bi2 xor . . . xor bim
• Produces a simple parity for each bit position and is known as a
longitudinal redundancy check
• Reasonably effective for random data as a data integrity check
• Perform a one-bit circular shift on the hash value after each
block is processed
• Has the effect of randomizing the input more completely and
overcoming any regularities that appear in the input
14. Requirements and
Security
• x is the preimage of h for
a hash value h = H(x)
• Is a data block whose
hash function, using the
function H, is h
• Because H is a many-to-
one mapping, for any
given hash value h, there
will in general be multiple
preimages
• Occurs if we have x ≠ y
and H(x) = H(y)
• Because we are using
hash functions for data
integrity, collisions are
clearly undesirable
17. * Resistance required if attacker is able to mount a chosen message attack
Table 11.2
Hash Function Resistance Properties Required for Various
Data Integrity Applications
18. Attacks on Hash
Functions
• Does not depend on the
specific algorithm, only
depends on bit length
• In the case of a hash
function, attack depends
only on the bit length of the
hash value
• Method is to pick values at
random and try each one
until a collision occurs
• An attack based on
weaknesses in a
particular cryptographic
algorithm
• Seek to exploit some
property of the algorithm
to perform some attack
other than an exhaustive
search
19. Birthday Attacks
• For a collision resistant attack, an adversary wishes to find two messages or
data blocks that yield the same hash function
• The effort required is explained by a mathematical result referred to as the
birthday paradox
• How the birthday attack works:
• The source (A) is prepared to sign a legitimate message x by appending the
appropriate m-bit hash code and encrypting that hash code with A’s private key
• Opponent generates 2m/2 variations x’ of x, all with essentially the same meaning,
and stores the messages and their hash values
• Opponent generates a fraudulent message y for which A’s signature is desired
• Two sets of messages are compared to find a pair with the same hash
• The opponent offers the valid variation to A for signature which can then be
attached to the fraudulent variation for transmission to the intended recipient
• Because the two variations have the same hash code, they will produce the same
signature and the opponent is assured of success even though the encryption key
is not known
20.
21. Hash Functions Based on
Cipher Block Chaining
• Can use block ciphers as hash functions
• Using H0=0 and zero-pad of final block
• Compute: Hi = E(Mi Hi-1)
• Use final block as the hash value
• Similar to CBC but without a key
• Resulting hash is too small (64-bit)
• Both due to direct birthday attack
• And “meet-in-the-middle” attack
• Other variants also susceptible to attack
22. Secure Hash Algorithm (SHA)
• SHA was originally designed by the National Institute
of Standards and Technology (NIST) and published as
a federal information processing standard (FIPS 180) in
1993
• Was revised in 1995 as SHA-1
• Based on the hash function MD4 and its design closely
models MD4
• Produces 160-bit hash values
• In 2002 NIST produced a revised version of the
standard that defined three new versions of SHA with
hash value lengths of 256, 384, and 512
• Collectively known as SHA-2
23. Note: All sizes are measured in bits.
Table 11.3
Comparison of SHA Parameters
29. (Figure can be found on
page 337 in textbook)
SHA-512
Logic
30. SHA-3
SHA-1 has not yet been "broken”
• No one has demonstrated a technique
for producing collisions in a practical
amount of time
• Considered to be insecure and has been
phased out for SHA-2
SHA-2 shares the same structure and
mathematical operations as its
predecessors so this is a cause for
concern
• Because it will take years to find a
suitable replacement for SHA-2
should it become vulnerable, NIST
decided to begin the process of
developing a new hash standard
NIST announced in 2007 a competition
for the SHA-3 next generation NIST
hash function
• Winning design was announced by
NIST in October 2012
• SHA-3 is a cryptographic hash
function that is intended to
complement SHA-2 as the approved
standard for a wide range of
applications
31. The Sponge Construction
• Underlying structure of SHA-3 is a scheme referred to by its
designers as a sponge construction
• Takes an input message and partitions it into fixed-size
blocks
• Each block is processed in turn with the output of each
iteration fed into the next iteration, finally producing an
output block
• The sponge function is defined by three parameters:
• f = the internal function used to process each input block
• r = the size in bits of the input blocks, called the bitrate
• pad = the padding algorithm
40. Summary
• Applications of
cryptographic hash
functions
• Message authentication
• Digital signatures
• Other applications
• Requirements and
security
• Security requirements
for cryptographic hash
functions
• Brute-force attacks
• Cryptanalysis
• Hash functions based
on cipher block
chaining
• Secure hash
algorithm (SHA)
• SHA-512 logic
• SHA-512 round
function
• SHA-3
• The sponge
construction
• The SHA-3 Iteration
Function f