has hash h fu func nction tions instructor ahmad boorghany
play

Has Hash h Fu Func nction tions Instructor: Ahmad Boorghany Most - PowerPoint PPT Presentation

Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Has Hash h Fu Func nction tions Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaways Introduction to


  1. Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Has Hash h Fu Func nction tions Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaway’s “Introduction to Modern Cryptography” course. Sharif University Introduction to Modern Cryptography Spring 2015 1 / 43

  2. Outline  Collision Resistant Hash Functions  Merkle – Damgård Construction  One-wayness Sharif University Introduction to Modern Cryptography Spring 2015 2 / 43

  3. Collision Resistant Hash Functions Sharif University Introduction to Modern Cryptography Spring 2015 3 / 43

  4. What is a hash function? Sharif University Introduction to Modern Cryptography Spring 2015 4 / 43

  5. Collision resistance (CR) Sharif University Introduction to Modern Cryptography Spring 2015 5 / 43

  6. Function families Sharif University Introduction to Modern Cryptography Spring 2015 6 / 43

  7. CR of function families Sharif University Introduction to Modern Cryptography Spring 2015 7 / 43

  8. CR of function families Sharif University Introduction to Modern Cryptography Spring 2015 8 / 43

  9. Example Sharif University Introduction to Modern Cryptography Spring 2015 9 / 43

  10. Example Sharif University Introduction to Modern Cryptography Spring 2015 10 / 43

  11. Birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 11 / 43

  12. Analysis of birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 12 / 43

  13. Analysis of birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 13 / 43

  14. Analysis of birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 14 / 43

  15. Analysis of birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 15 / 43

  16. Birthday attack times Sharif University Introduction to Modern Cryptography Spring 2015 16 / 43

  17. Merkle – Damgård Construction Sharif University Introduction to Modern Cryptography Spring 2015 17 / 43

  18. Compression functions Sharif University Introduction to Modern Cryptography Spring 2015 18 / 43

  19. The MD transform Sharif University Introduction to Modern Cryptography Spring 2015 19 / 43

  20. The MD transform Sharif University Introduction to Modern Cryptography Spring 2015 20 / 43

  21. MD preserves CR Sharif University Introduction to Modern Cryptography Spring 2015 21 / 43

  22. MD preserves CR Sharif University Introduction to Modern Cryptography Spring 2015 22 / 43

  23. How 𝐵 ℎ works Sharif University Introduction to Modern Cryptography Spring 2015 23 / 43

  24. Sharif University Introduction to Modern Cryptography Spring 2015 24 / 43

  25. Sharif University Introduction to Modern Cryptography Spring 2015 25 / 43

  26. How are compression functions designed? Sharif University Introduction to Modern Cryptography Spring 2015 26 / 43

  27. How are compression functions designed? Sharif University Introduction to Modern Cryptography Spring 2015 27 / 43

  28. How are compression functions designed? Sharif University Introduction to Modern Cryptography Spring 2015 28 / 43

  29. How are compression functions designed? Sharif University Introduction to Modern Cryptography Spring 2015 29 / 43

  30. One-wayness Sharif University Introduction to Modern Cryptography Spring 2015 30 / 43

  31. One-wayness Sharif University Introduction to Modern Cryptography Spring 2015 31 / 43

  32. One-wayness adversaries Sharif University Introduction to Modern Cryptography Spring 2015 32 / 43

  33. Issues in formalizing one-wayness Sharif University Introduction to Modern Cryptography Spring 2015 33 / 43

  34. Formal definition of one-wayness Sharif University Introduction to Modern Cryptography Spring 2015 34 / 43

  35. Does CR imply OW? Sharif University Introduction to Modern Cryptography Spring 2015 35 / 43

  36. Does CR imply OW? Sharif University Introduction to Modern Cryptography Spring 2015 36 / 43

  37. CR ⇏ OW Sharif University Introduction to Modern Cryptography Spring 2015 37 / 43

  38. CR ⇒ OW for functions that compress Sharif University Introduction to Modern Cryptography Spring 2015 38 / 43

  39. Proof of Theorem Sharif University Introduction to Modern Cryptography Spring 2015 39 / 43

  40. Advantage of B Sharif University Introduction to Modern Cryptography Spring 2015 40 / 43

  41. Advantage of B Sharif University Introduction to Modern Cryptography Spring 2015 41 / 43

  42. Advantage of B Sharif University Introduction to Modern Cryptography Spring 2015 42 / 43

  43. Questions? Sharif University Introduction to Modern Cryptography Spring 2015 43 / 43

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend