Computer Security: Principles and Practice, 1/e


To be useful for message authentication: a hash function H must have the following properties



Download 2,39 Mb.
bet2/5
Sana10.11.2022
Hajmi2,39 Mb.
#862890
1   2   3   4   5
Bog'liq
DigitalSignatures-1

To be useful for message authentication: a hash function H must have the following properties:


Can be applied to a block of data of any size
Produces a fixed-length output
H(x) is relatively easy to compute for any given x
One-way or pre-image resistant
    • Computationally infeasible to find x such that H(x) = h, or for a given x1, it is hard to find x2, such that x2 ≠ x1 with H(x1) = H(x2)

Computationally infeasible to find y ≠ x such that H(y) = H(x)
Collision resistant or strong collision resistance
    • Computationally infeasible to find any pair (x,y) such that H(x) = H(y)

Security of Hash Functions ??


There are two approaches to attacking a secure hash function:
Cryptanalysis
    • Exploit logical weaknesses in the algorithm

Brute-force attack
    • Strength of hash function depends solely on the length of the hash code produced by the algorithm

SHA most widely used hash algorithm
Secure Hash Algorithms (SHA),
SHA family : SHA-1  160 bits SHA-256,  256 bits SHA-384 384 bits and SHA-512 512 bits
Additional secure hash function applications:
Passwords
    • Hash of a password is stored by an operating system

Intrusion detection
    • Store H(F) for each file on a system and secure the hash values

Table 2.3

Applications for Public-Key Cryptosystems

Digital Signatures

  • NIST FIPS PUB 186-4 defines a digital signature as: (link)
  • “The result of a cryptographic transformation of data that,

    when properly implemented, provides a mechanism for

    verifying origin authentication, data integrity and signatory non-repudiation.”

      • Thus, a digital signature is a data-dependent bit pattern, generated by an agent as a function of a file, message, or other form of data block
      • FIPS 186-4 specifies the use of one of three digital signature algorithms:
          • Digital Signature Algorithm (DSA)
          • RSA Digital Signature Algorithm
          • Elliptic Curve Digital Signature Algorithm (ECDSA)

Download 2,39 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish