has hash h fu func nction tions instructor ahmad boorghany
play

Has Hash h Fu Func nction tions Instructor: Ahmad Boorghany Most - PowerPoint PPT Presentation

Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Has Hash h Fu Func nction tions Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaways Introduction to


  1. Data and Network Security Lab Sharif University of Technology Department of Computer Engineering Has Hash h Fu Func nction tions Instructor: Ahmad Boorghany Most of the slides are obtained from Bellare and Rogaway’s “Introduction to Modern Cryptography” course. Sharif University Introduction to Modern Cryptography Spring 2015 1 / 43

  2. Outline  Collision Resistant Hash Functions  Merkle – Damgård Construction  One-wayness Sharif University Introduction to Modern Cryptography Spring 2015 2 / 43

  3. Collision Resistant Hash Functions Sharif University Introduction to Modern Cryptography Spring 2015 3 / 43

  4. What is a hash function? Sharif University Introduction to Modern Cryptography Spring 2015 4 / 43

  5. Collision resistance (CR) Sharif University Introduction to Modern Cryptography Spring 2015 5 / 43

  6. Function families Sharif University Introduction to Modern Cryptography Spring 2015 6 / 43

  7. CR of function families Sharif University Introduction to Modern Cryptography Spring 2015 7 / 43

  8. CR of function families Sharif University Introduction to Modern Cryptography Spring 2015 8 / 43

  9. Example Sharif University Introduction to Modern Cryptography Spring 2015 9 / 43

  10. Example Sharif University Introduction to Modern Cryptography Spring 2015 10 / 43

  11. Birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 11 / 43

  12. Analysis of birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 12 / 43

  13. Analysis of birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 13 / 43

  14. Analysis of birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 14 / 43

  15. Analysis of birthday attack Sharif University Introduction to Modern Cryptography Spring 2015 15 / 43

  16. Birthday attack times Sharif University Introduction to Modern Cryptography Spring 2015 16 / 43

  17. Merkle – Damgård Construction Sharif University Introduction to Modern Cryptography Spring 2015 17 / 43

  18. Compression functions Sharif University Introduction to Modern Cryptography Spring 2015 18 / 43

  19. The MD transform Sharif University Introduction to Modern Cryptography Spring 2015 19 / 43

  20. The MD transform Sharif University Introduction to Modern Cryptography Spring 2015 20 / 43

  21. MD preserves CR Sharif University Introduction to Modern Cryptography Spring 2015 21 / 43

  22. MD preserves CR Sharif University Introduction to Modern Cryptography Spring 2015 22 / 43

  23. How 𝐵 ℎ works Sharif University Introduction to Modern Cryptography Spring 2015 23 / 43

  24. Sharif University Introduction to Modern Cryptography Spring 2015 24 / 43

  25. Sharif University Introduction to Modern Cryptography Spring 2015 25 / 43

  26. How are compression functions designed? Sharif University Introduction to Modern Cryptography Spring 2015 26 / 43

  27. How are compression functions designed? Sharif University Introduction to Modern Cryptography Spring 2015 27 / 43

  28. How are compression functions designed? Sharif University Introduction to Modern Cryptography Spring 2015 28 / 43

  29. How are compression functions designed? Sharif University Introduction to Modern Cryptography Spring 2015 29 / 43

  30. One-wayness Sharif University Introduction to Modern Cryptography Spring 2015 30 / 43

  31. One-wayness Sharif University Introduction to Modern Cryptography Spring 2015 31 / 43

  32. One-wayness adversaries Sharif University Introduction to Modern Cryptography Spring 2015 32 / 43

  33. Issues in formalizing one-wayness Sharif University Introduction to Modern Cryptography Spring 2015 33 / 43

  34. Formal definition of one-wayness Sharif University Introduction to Modern Cryptography Spring 2015 34 / 43

  35. Does CR imply OW? Sharif University Introduction to Modern Cryptography Spring 2015 35 / 43

  36. Does CR imply OW? Sharif University Introduction to Modern Cryptography Spring 2015 36 / 43

  37. CR ⇏ OW Sharif University Introduction to Modern Cryptography Spring 2015 37 / 43

  38. CR ⇒ OW for functions that compress Sharif University Introduction to Modern Cryptography Spring 2015 38 / 43

  39. Proof of Theorem Sharif University Introduction to Modern Cryptography Spring 2015 39 / 43

  40. Advantage of B Sharif University Introduction to Modern Cryptography Spring 2015 40 / 43

  41. Advantage of B Sharif University Introduction to Modern Cryptography Spring 2015 41 / 43

  42. Advantage of B Sharif University Introduction to Modern Cryptography Spring 2015 42 / 43

  43. Questions? Sharif University Introduction to Modern Cryptography Spring 2015 43 / 43

Recommend


More recommend