Cryptography Cryptographic Hash Functions
Uwe Egly
Vienna University of Technology Institute of Information Systems Knowledge-Based Systems Group
1 / 26
Cryptography Cryptographic Hash Functions Uwe Egly Vienna - - PowerPoint PPT Presentation
Cryptography Cryptographic Hash Functions Uwe Egly Vienna University of Technology Institute of Information Systems Knowledge-Based Systems Group 1 / 26 Overview Hash function (HF) accepts input of arbitrary length Returns
1 / 26
2 / 26
3 / 26
4 / 26
1 2n ) to HVs
5 / 26
6 / 26
preimage resistant collision resistant preimage resistant 2nd
7 / 26
◮ Construct message digest of, e.g., a software distribution ◮ Modification of data can be detected: compute HV and
◮ HV of the original data has to be write-protected ◮ The data/programs can be given away
8 / 26
9 / 26
10/ 26
i=0 −i/n = e−k(k−1)/(2n)
11/ 26
12/ 26
iterated compression function
transformation fixed length
13/ 26
14/ 26
◮ Divide hash input x into t fixed-length r-bit blocks xi ◮ Padding: Fill last block with padding bits ◮ Often for security reasons: Add original message size in
15/ 26
16/ 26
17/ 26
18/ 26
19/ 26
◮ Single: HV has as many bit as the blocksize (=n-bit) ◮ Double: HV has twice as many bit as the blocksize (=2n-bit)
20/ 26
21/ 26
22/ 26
Some information taken from http://paginas.terra.com.br/informatica/paulobarreto/WhirlpoolPage.html 23/ 26
◮ Uses padding method 2. ◮ Introduce the bit value 1 after the message string ◮ Then add 0s and the 256 bit length block afterwards ◮ The length of the final input message m is a multiple of 512 ◮ Decompose m into 512 bit blocks m1, m2, . . . , mt
24/ 26
25/ 26
◮ time constraints ◮ good descriptions are available at Wikipedia, in HAC, in
26/ 26