security proofs for the md6 hash algorithm
play

Security Proofs for the MD6 Hash Algorithm Ahmed Ezzat Outline - PowerPoint PPT Presentation

Security Proofs for the MD6 Hash Algorithm Ahmed Ezzat Outline Introduction to hash algorithms NIST SHA-3 Competition MD6 Algorithm and Mode of Operation Research Objective Approach Introduction to hash algorithms Hash


  1. Security Proofs for the MD6 Hash Algorithm Ahmed Ezzat

  2. Outline � Introduction to hash algorithms � NIST SHA-3 Competition � MD6 Algorithm and Mode of Operation � Research Objective � Approach

  3. Introduction to hash algorithms � Hash function definition � Usage Scenarios � Digital Signature � Message Integrity � Password Verification

  4. Introduction to hash algorithms � Properties � Collision resistance � First pre-image resistance � Second pre-image resistance � Pseudo randomness � Unpredictability

  5. NIST SHA-3 Competition � Salted Hashing � Parellizable � Requirements for a message digest of d-bits: � Collision resistance of approximately d/2 bits. � First - preimage resistance of approximately d bits. � Second - preimage resistance of approximately d − k bits for any message shorter than 2 k bits.

  6. MD6 Algorithm and Mode of Operation � Input message structure

  7. MD6 Algorithm and Mode of Operation � Input: A[ 0 .. 88 ] of A[ 0 .. 16r + 88] for i = 89 to 16 r + 88 : = S i ⊕ ⊕ x A[ i-17 ] A[ i-89 ] ⊕ ( A[ i-18 ] ∧ A[ i-21 ] ) ⊕ ( A[ i-31 ] ∧ A[ i-67 ] ) = x ⊕ x ( x >> r i ) = x ⊕ ( x << l i ) A[i] return A[ 16r + 73 .. 16r + 88 ]

  8. MD6 Algorithm and Mode of Operation � Mode of operation snapshot

  9. MD6 Algorithm and Mode of Operation

  10. MD6 Algorithm and Mode of Operation

  11. Properties Remaining � Second pre-image resistance � Unpredictability

  12. Research Objective The continuation of the security proofs for the MD6 hash function mode of operation

  13. Approach � Mathematical � Empirical

  14. References [1] Cryptographic hash function. Available at http://en.wikipedia.org/wiki/Cryptographic_hash_function [2] Christopher Yale Crutchfield. Security Proofs for the MD6 Hash Function Mode of Operation. Available at http://groups.csail.mit.edu/cis/theses/crutchfield-masters-thesis.pdf [3] The MD6 Hash Function. Available at http://groups.csail.mit.edu/cis/md6/submitted-2008-10- 27/Supporting_Documentation/md6_report.pdf

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend