Cryptography Flashcards
Hash functions
Requirements for a one-way hash function h:
1.Ease of computation: given x, it is easy to compute h(x).
2.Compression: h maps inputs x of arbitrary bitlength to outputs h(x) of a fixed bitlength n.
3.One-way: given a value y, it is computationally infeasible to find an input x so that h(x)=y.
4.Collision resistance: it is computationally infeasible to find x and x’, where x ≠ x’, with
h(x)=h(x’) (note: two variants of this property).
symmetric ciphers
Den hemmelige nøkkelen er brukt til både kryptering og dekryptering
Status/usage of SHA-1, SHA-2 and SHA-3
Dette er noen kjente Hash funksjoner:
• SHA-1 (Secure Hash Algorithm):160 bit digest. Designed to operate with DSA (Digital Signature Standard). Attacks exist. Not recommended, but sometimes still in use.
• SHA-2 designed by NSA in 2001 provides 224, 256, 384, and 512 bit digest. Considered secure. Replacement for SHA-1.
• SHA-3: designed by Joan Daemen + others in 2010.
Standardized in 2015. Digest of: 224, 256, 384, and 512 bit.
SHA-3 has little use, because SHA-2 is considered strong.
Parameters (block and key size) of AES
Advanced Encryption Standard. AES har en key sizes på 128, 192 or 256 bit
og en block size på 128 bit.
Applications of Hash functions and symmetric ciphers
..
MAC (Message Authentication Code)
- En melding M med en simpel message hash h(M) kan bli endret av en attacker.
- In communications, trenger vi å verifisere dataens opprinnelse, i.e. trenger vi message authentication.
- MAC (message authentication code) kan bruke hash function som h(M, k) i.e. med message M og en secret key k som input.
- For å validate and authenticate en message, må mottakeren dele den samme secret key brukt to compute the MAC with the sender.
- A third party who does not know the key cannot validate
the MAC.
Basic principle: keyed hash function
Samme som MAC functions.
The algorithm used to compute a MAC. Eksempler. HMAC, CBC-MAC, CMAC
(MAC) Security services
..
Asymmetric ciphers
Et par med private og public keys hvor det er beregningsmessig umulig å hente den private dekrypteringsnøkkelen fra den tilsvarende offentlige krypteringsnøkkelen.
Key Exchange
Diffie-Hellman key agreement (provides no authentication)
usage of keys in encryption and digital signature
..
Digital signature
I motsetning til MAC, så kan digital signatures bli verifisert av en 3.part.
– Used for non-repudiation,
– data origin authentication and
– data integrity
(Asymmetric ciphers) security services
..
Threat to classical crypto from quantum computing
Dersom det blir tatt i bruk quantum computing (med minst 1 mill qubits) vil det være mulig å dekryptere alle krypterte meldinger kun ved å implementere Shor sin quantum algoritme.
Cryptography
The science of secret writing
with the goal of hiding the meaning of a message.