Security Proofs for the MD6 Hash Algorithm Ahmed Ezzat Outline - - PowerPoint PPT Presentation

security proofs for the md6 hash algorithm
SMART_READER_LITE
LIVE PREVIEW

Security Proofs for the MD6 Hash Algorithm Ahmed Ezzat Outline - - PowerPoint PPT Presentation

Security Proofs for the MD6 Hash Algorithm Ahmed Ezzat Outline Introduction to hash algorithms NIST SHA-3 Competition MD6 Algorithm and Mode of Operation Research Objective Approach Introduction to hash algorithms Hash


slide-1
SLIDE 1

Security Proofs for the MD6 Hash Algorithm

Ahmed Ezzat

slide-2
SLIDE 2

Outline

Introduction to hash algorithms NIST SHA-3 Competition MD6 Algorithm and Mode of Operation Research Objective Approach

slide-3
SLIDE 3

Introduction to hash algorithms

Hash function definition Usage Scenarios

Digital Signature Message Integrity Password Verification

slide-4
SLIDE 4

Introduction to hash algorithms

Properties

Collision resistance First pre-image resistance Second pre-image resistance Pseudo randomness Unpredictability

slide-5
SLIDE 5

NIST SHA-3 Competition

Salted Hashing Parellizable Requirements for a message digest of d-bits:

Collision resistance of approximately d/2 bits. First - preimage resistance of approximately d

bits.

Second - preimage resistance of approximately d

− k bits for any message shorter than 2k bits.

slide-6
SLIDE 6

MD6 Algorithm and Mode of Operation

Input message structure

slide-7
SLIDE 7

MD6 Algorithm and Mode of Operation

Input: A[ 0 .. 88 ] of A[ 0 .. 16r + 88]

for i = 89 to 16 r + 88 : x = Si ⊕ A[ i-17 ] ⊕ A[ i-89 ] ⊕ ( A[ i-18 ] ∧ A[ i-21 ] ) ⊕ ( A[ i-31 ] ∧ A[ i-67 ] ) x = x ⊕ ( x >> ri ) A[i] = x ⊕ ( x << li ) return A[ 16r + 73 .. 16r + 88 ]

slide-8
SLIDE 8

MD6 Algorithm and Mode of Operation

Mode of operation snapshot

slide-9
SLIDE 9

MD6 Algorithm and Mode of Operation

slide-10
SLIDE 10

MD6 Algorithm and Mode of Operation

slide-11
SLIDE 11

Properties Remaining

Second pre-image resistance Unpredictability

slide-12
SLIDE 12

Research Objective

The continuation of the security proofs for the MD6 hash function mode of operation

slide-13
SLIDE 13

Approach

Mathematical Empirical

slide-14
SLIDE 14

References

[1] Cryptographic hash function. Available at http://en.wikipedia.org/wiki/Cryptographic_hash_function [2] Christopher Yale Crutchfield. Security Proofs for the MD6 Hash Function Mode of Operation. Available at http://groups.csail.mit.edu/cis/theses/crutchfield-masters-thesis.pdf [3] The MD6 Hash Function. Available at http://groups.csail.mit.edu/cis/md6/submitted-2008-10- 27/Supporting_Documentation/md6_report.pdf