• Tidak ada hasil yang ditemukan

MD5 Authentication Hash Algorithms

N/A
N/A
Protected

Academic year: 2024

Membagikan "MD5 Authentication Hash Algorithms"

Copied!
5
0
0

Teks penuh

(1)

MD5 Authentication MD5 Authentication

Lee,

Lee, Hoon Hoon- -Jae Jae Dongseo

Dongseo University University

Hash Algorithms Hash Algorithms

• • see similarities in the evolution of hash see similarities in the evolution of hash functions & block ciphers

functions & block ciphers

– increasing power of bruteincreasing power of brute--force attacksforce attacks –– leading to evolution in algorithmsleading to evolution in algorithms

–– from DES to AES in block ciphersfrom DES to AES in block ciphers

–– from MD4 & MD5 to SHAfrom MD4 & MD5 to SHA--1 & RIPEMD1 & RIPEMD--160 160 in hash algorithms

in hash algorithms

• • likewise tend to use common iterative st likewise tend to use common iterative st ructure as do block ciphers

ructure as do block ciphers

(2)

MD5 MD5

• • designed by Ronald Rivest designed by Ronald Rivest (the R in (the R in RSA) RSA)

• • latest in a series of MD2, MD4 latest in a series of MD2, MD4

• • produces a 128- produces a 128 -bit hash value bit hash value

• • until recently was the most widely used until recently was the most widely used hash algorithm

hash algorithm

––in recent times have both brute-in recent times have both brute-force & cryforce & cry ptanalytic concerns

ptanalytic concerns

• • specified as Internet standard RFC1321 specified as Internet standard RFC1321

MD5 Overview MD5 Overview

1. 1.

pad message so its length is 448 mod 512 pad message so its length is 448 mod 512

2. 2.

append a 64-append a 64-bit length value to message bit length value to message

3. 3.

initialise 4-initialise 4-word (128word (128--bit) MD buffer bit) MD buffer (A,B,C,D)

(A,B,C,D)

4. 4.

process message in 16-process message in 16-word (512word (512--bit) bit) blocks:

blocks:

using 4 rounds of 16 bit operations on message using 4 rounds of 16 bit operations on message block & buffer

block & buffer

add output to buffer input to form new buffer add output to buffer input to form new buffer value

value

5. 5.

output hash value is the final buffer value output hash value is the final buffer value

(3)

MD5 Overview MD5 Overview

MD5 Compression Function MD5 Compression Function

• • each round has 16 steps of the form: each round has 16 steps of the form:

a =

a = b+((a+g(b,c,d)+X[k]+T[ib+((a+g(b,c,d)+X[k]+T[i])<<<s) ])<<<s)

• • a,b,c,d a,b,c,d refer to the 4 words of the refer to the 4 words of the

buffer, but used in varying permutations buffer, but used in varying permutations

–– note this updates 1 word only of the buffernote this updates 1 word only of the buffer –

– after 16 steps each word is updated 4 timeafter 16 steps each word is updated 4 time ss

• • where g(b,c,d where g(b,c,d) is a different nonlinear ) is a different nonlinear function in each round (F,G,H,I)

function in each round (F,G,H,I)

• • T[i] is a constant value derived from sin T[i ] is a constant value derived from sin

(4)

MD5 Compression Function MD5 Compression Function

MD4 MD4

• • precursor to MD5 precursor to MD5

• • also produces a 128- also produces a 128 -bit hash of bit hash of message

message

• • has 3 rounds of 16 steps vs has 3 rounds of 16 steps vs 4 in MD5 4 in MD5

• • design goals: design goals:

–– collision resistant (hard to find collisions) collision resistant (hard to find collisions) –– direct security (no dependence on "hard" direct security (no dependence on "hard"

problems) problems)

–– fast, simple, compact fast, simple, compact

–– favours littlefavours little--endian systems (eg PCs) endian systems (eg PCs)

(5)

Strength of MD5 Strength of MD5

• •

MD5 hash is dependent on all message bitsMD5 hash is dependent on all message bits

• •

RivestRivest claims security is good as can beclaims security is good as can be

• •

known attacks are:known attacks are:

BersonBerson 92 attacked any 1 round using differential 92 attacked any 1 round using differential cryptanalysis (but can

cryptanalysis (but can’t extend)t extend)

Boer & Boer & BosselaersBosselaers 93 found a pseudo collision (ag93 found a pseudo collision (ag ain unable to extend)

ain unable to extend)

DobbertinDobbertin 96 created collisions on MD compressio96 created collisions on MD compressio n function (but initial constants prevent exploit) n function (but initial constants prevent exploit)

• •

conclusion is that MD5 looks vulnerable soonconclusion is that MD5 looks vulnerable soon

Referensi

Dokumen terkait

The purpose of this study is to construct an ideal lattice-based hash function algorithm, analyzing the speed of the hash functions as a result of construction, and comparing it

Following the definition of the hash function and its construction techniques in the [9], the definition and construction of hash functions in this article is enough to define

In this paper we will make a discussion on the conditions when a strongly collisionfree hash function is also one-way hash function and also some considerations about the security

The design and properties of HMAC are such that Dobbertin’s current techniques that might find collisions for either the compression function or the full hash function of MD5 seem

• Dengan kata lain, fungsi hash mengkompresi sembarang pesan yang berukuran berapa saja menjadi message digest yang ukurannya selalu tetap (dan lebih pendek dari panjang

Setelah user mengunggah kunci dan file dokumen, sistem menjalankan algoritma MD5 untuk mencari fungsi hash dari kunci tersebut dengan empat tahap proses, yaitu : Menambahkan

滾動 hash(Rolling hash) 其實因為 ASCII Code 會界於 0~127 之間,因此我們可以把它想成一個 128 進位的數(當 然也可以更大),例如字串”abc”=97×1282+98×1281+99×1280 = 1601891。當然 Mod 應該要於過程中去處理,以免發生溢位情形(對其他 hash function 或許沒差,可是

Their protocol is based on a hash function embedding in a tag and a random number generator on a back-end server to protect the user information privacy, the user location privacy, and