Unit 8 Cryptographic Hash Function
Unit 8 Cryptographic Hash Function
Cryptographic
Hash Functions
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
12.1
Chapter 12
Objectives
To introduce general ideas behind cryptographic
hash functions
To discuss the Merkle-Damgard scheme as the basis
for iterated hash functions
To distinguish between two categories of hash
functions:
To discuss the structure of SHA-512.
12.2
12-1 INTRODUCTION
12.3
12.1.1 Iterated Hash Function
Merkle-Damgard Scheme
12.4
12.1.2 Two Groups of Compression Functions
12.5
Hash Function Made from Scratch
Message Digest(MD)
Designed by Ron Rivest
versions- MD2,MD4,MD5
and SHA-512
12.6
Hash Function Made from Scratch
Other Algorithms
RACE Integrity Primitives Evaluation message
Digest(RIPMED)
RIPMED-160 is based on MD5 but two line of parallel
execution is there.
HAVAL is variable length hashing algorithm with
message digest size 128, 160, 192, 224 and 256 where
block size is 1024.
12.7
Comparison of SHA
12.8
Hash Functions based on block cipher
Rabin Scheme
12.9
12.1.2 Continued
Davies-Meyer Scheme
12.10
12.1.2 Continued
Matyas-Meyer-Oseas Scheme
12.11
12.1.2 Continued
Miyaguchi-Preneel Scheme
12.12
12-2 SHA-512
12.14
12.2.1 Continued
Message Preparation
SHA-512 insists that the length of the original message
be less than 2128 bits.
Note
SHA-512 creates a 512-bit message digest out of a
message less than 2128.
12.15
12.2.1 Continued
12.16
12.2.1 Continued
Words
12.17
12.2.1 Continued
Word Expansion
Figure 12.9 Word expansion in SHA-512
12.18
12.2.1 Continued
12.20
12.2.2 Continued
Figure 12.11 Structure of each round in SHA-512
12.21
12.2.2 Continued
Majority Function
Conditional Function
Rotate Functions
12.22
12.2.2 Continued
12.23
12.2.2 Continued
12.24
12.2.3 Analysis
12.25
Questions
12.27
Introduction MD5
Fifth iteration developed by Professor Ronald L.
Rivest (RSA) in 1991.
According to RFC 1321, “MD5 message-digest
algorithm takes as input a message of arbitrary
length and produces as output a 128-bit
"fingerprint" or "message digest" of the input …
The MD5 algorithm is intended for digital
signature applications, where a large file must be
"compressed" in a secure manner before being
encrypted with a private (secret) key under a
public-key cryptosystem such as RSA.”
MD5 is optimized for use on 32-bit computers
MD5 Algorithm Structure
MD5 Algorithm
Implementation Steps
word A: 01 23 45 67
word B: 89 ab cd ef
word C: fe dc ba 98
word D: 76 54 32 10
Implementation Steps
Implementation Steps
Round 1.
12.38