SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Cryptographic Attack
Attacks and Analysis
Submitted By :
Md. Iftekhar Alam Efat
Lecturer
IIT , NSTU
Presented By :
Al Jaber (ASH1825029M)
Saifur Rahman(ASH1825031M)
Nadim Bhuiyan (ASH1825034M)
Contents
• Theme
• Literature Review
• Model
Introduction
 Cryptographic hash functions are one of the most important primitives in cryptography.
They are used in many applications, including digital signature schemes, MAC
algorithms, and PRNG.
 A hash function takes in arbitrary length of message and produces a fixed length output
called as the message digest. A hash function should follow the following properties.
(i) It is impossible to produce the message given the hash value.
(ii)No two messages should produce the same hash output(collision resistant).
(iii)It is impossible to modify the message without modifying the hash.
 Several types of Cryptographic hash functions are used :
 Grøstl
 SHA-1
 SHA-3
Literature Review
 Many cryptographic hash functions are use in many application such as digital
signature ,password etc. The discovery of the collision attacks on NIST’s
standard hash function SHA-1 , there is a strong need for a secure and
efficient hash function. In 2008, NIST launched the SHA-3 competition , in
2012. To analyze AES-type functions, several cryptanalytic techniques were
developed. In there they use the start-from-the-middle and the Super-Sbox
variants of the rebound technique to analyze the reduced-round Grøstl-224
and Grøstl-256 hash functions, compression function, and permutations.
A Short Description of Grøstl
 Grøstl is a cryptographic hash function. It uses the same S-box as AES in a custom
construction.
 The chaining values are 512-bit for Grøstl-224 and -256. They are stored as an 8 by 8
matrix whose elements are bytes.
 The compression function takes a 512-bit chaining value (CV) and a 512-bit message
block as inputs and generates a new 512-bit CV. The compression function uses two
permutations P and Q, with input length 512-bit.
x = CompGrøstl(y, z) = P(y ⊕ z) ⊕ Q(z) ⊕ y,
 A message is padded and divided into 512-bit message blocks m1, . . .,mb and processed
as follows to generate a hash value h, hi = f(hi−1, mi).
 The final output is (512 or 1024 bits).
SHA-1,Rebound ATTack
 SHA-1 is a cryptographic hash function which takes an input and produces a
160-bit (20-byte) hash value known as a message digest – typically rendered
as a hexadecimal number, 40 digits long.
 The rebound attack is a tool in the cryptanalysis of cryptographic hash
functions. It was conceived to attack AES like functions such
as Whirlpool and Grøstl. The Rebound Attack is a type of statistical attack
on hash functions, using techniques such as rotational and differential
cryptanalysis to find collisions
Pros & Cons
 Pros :
 making it harder for an attacker to break passwords
 making it harder for an attacker to digital signature
 making it harder for an attacker to verification code
 Cons :
Conclusion
We analyzed the Grøstl hash functions:
Using the start-from-the middle rebound technique, we have shown a collision attack on the
Grøstl-256 hash function reduced to 5 rounds and 6 rounds with 248 and 2112 time
complexities.
Furthermore, semi-free-start collision attacks on the Grøstl- 224 and -256 hash functions
reduced to 7 rounds, on the Grøstl-224 and -256 compression functions reduced to 8 rounds
were shown and some improvements of distinguishers of the permutations were presented.
While our analysis shows (semi-free-start) collision attacks for up to seven rounds which
leaves just three rounds of security margin, it does not pose a direct threat to the full Grøstl
hash or compression function.
Hull Click Human Identification Protocol
 This protocol is mainly about identification of human using
Convex Hull Algorithm.
 Using Convex Hull Algorithm, Human identification can be
collected.
Convex Hull Algorithm
 Mainly convex hull algorithm is about
some random points within a
exact area which is a polygon.
but specialty is the inner
angles wont be more a 180
degree.
 And the are must cover all the
other points.
 Using this algorithm human’s face or finger prints are detected.
face becomes divided into some points like, distance among eyes, nose, mouth or other
things.

Human identification protocol
CHC protocol
 C is the computer or the server that will detect the identification.
 H is the human, who is to be identified.
 C then repeats the process and accepts or rejects.
 Let there are n=30, m=25
Secret icons or labels are = {7, 15, 27, 30}
Attack-01
 The possibility of of getting secret label is:
 The possibility of getting non-secret labels is:
Cont…
 Simulation results for Attack 01 is like below:
Cont…
 Output of attacks 02..
Hash Function(Grostl) and Contex Hull Research paper

Weitere ähnliche Inhalte

Was ist angesagt?

Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decoding
ajithc0003
 

Was ist angesagt? (20)

High Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter ModeHigh Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter Mode
 
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check MatrixLDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
Low power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decodingLow power ldpc decoder implementation using layer decoding
Low power ldpc decoder implementation using layer decoding
 
Partial Homomorphic Encryption
Partial Homomorphic EncryptionPartial Homomorphic Encryption
Partial Homomorphic Encryption
 
Distributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structureDistributed key generation protocol with hierarchical threshold access structure
Distributed key generation protocol with hierarchical threshold access structure
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Network Coding
Network CodingNetwork Coding
Network Coding
 
Thesis_Presentation
Thesis_PresentationThesis_Presentation
Thesis_Presentation
 
Secure Hashing Techniques - Introduction
Secure Hashing Techniques - IntroductionSecure Hashing Techniques - Introduction
Secure Hashing Techniques - Introduction
 
My review on low density parity check codes
My review on low density parity check codesMy review on low density parity check codes
My review on low density parity check codes
 
A new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping setsA new Algorithm to construct LDPC codes with large stopping sets
A new Algorithm to construct LDPC codes with large stopping sets
 
LDPC Encoding
LDPC EncodingLDPC Encoding
LDPC Encoding
 
LDPC
LDPCLDPC
LDPC
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
2 1
2 12 1
2 1
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
 
LDPC Codes
LDPC CodesLDPC Codes
LDPC Codes
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 

Ähnlich wie Hash Function(Grostl) and Contex Hull Research paper

Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
paperpublications3
 

Ähnlich wie Hash Function(Grostl) and Contex Hull Research paper (20)

Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
IRJET - Hash Functions and its Security for Snags
IRJET -  	  Hash Functions and its Security for SnagsIRJET -  	  Hash Functions and its Security for Snags
IRJET - Hash Functions and its Security for Snags
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 
Hash_Crypto.ppt
Hash_Crypto.pptHash_Crypto.ppt
Hash_Crypto.ppt
 
HASH FUNCTIONS.pdf
HASH FUNCTIONS.pdfHASH FUNCTIONS.pdf
HASH FUNCTIONS.pdf
 
Hash
HashHash
Hash
 
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
 
Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2
 
Cryptography-Hash-Functions.pptx
Cryptography-Hash-Functions.pptxCryptography-Hash-Functions.pptx
Cryptography-Hash-Functions.pptx
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 
Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.Count based Secured Hash Algorithm.
Count based Secured Hash Algorithm.
 

Mehr von SAIFUR RAHMAN (7)

DepenDNS Analysis
DepenDNS AnalysisDepenDNS Analysis
DepenDNS Analysis
 
Student Management System
Student Management SystemStudent Management System
Student Management System
 
Input & output
Input & outputInput & output
Input & output
 
Exception handling
Exception handlingException handling
Exception handling
 
Recommendation system
Recommendation systemRecommendation system
Recommendation system
 
Function
FunctionFunction
Function
 
Discrete math (sets)
Discrete math (sets)Discrete math (sets)
Discrete math (sets)
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Hash Function(Grostl) and Contex Hull Research paper

  • 2. Attacks and Analysis Submitted By : Md. Iftekhar Alam Efat Lecturer IIT , NSTU Presented By : Al Jaber (ASH1825029M) Saifur Rahman(ASH1825031M) Nadim Bhuiyan (ASH1825034M)
  • 4. Introduction  Cryptographic hash functions are one of the most important primitives in cryptography. They are used in many applications, including digital signature schemes, MAC algorithms, and PRNG.  A hash function takes in arbitrary length of message and produces a fixed length output called as the message digest. A hash function should follow the following properties. (i) It is impossible to produce the message given the hash value. (ii)No two messages should produce the same hash output(collision resistant). (iii)It is impossible to modify the message without modifying the hash.  Several types of Cryptographic hash functions are used :  Grøstl  SHA-1  SHA-3
  • 5. Literature Review  Many cryptographic hash functions are use in many application such as digital signature ,password etc. The discovery of the collision attacks on NIST’s standard hash function SHA-1 , there is a strong need for a secure and efficient hash function. In 2008, NIST launched the SHA-3 competition , in 2012. To analyze AES-type functions, several cryptanalytic techniques were developed. In there they use the start-from-the-middle and the Super-Sbox variants of the rebound technique to analyze the reduced-round Grøstl-224 and Grøstl-256 hash functions, compression function, and permutations.
  • 6. A Short Description of Grøstl  Grøstl is a cryptographic hash function. It uses the same S-box as AES in a custom construction.  The chaining values are 512-bit for Grøstl-224 and -256. They are stored as an 8 by 8 matrix whose elements are bytes.  The compression function takes a 512-bit chaining value (CV) and a 512-bit message block as inputs and generates a new 512-bit CV. The compression function uses two permutations P and Q, with input length 512-bit. x = CompGrøstl(y, z) = P(y ⊕ z) ⊕ Q(z) ⊕ y,  A message is padded and divided into 512-bit message blocks m1, . . .,mb and processed as follows to generate a hash value h, hi = f(hi−1, mi).  The final output is (512 or 1024 bits).
  • 7. SHA-1,Rebound ATTack  SHA-1 is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest – typically rendered as a hexadecimal number, 40 digits long.  The rebound attack is a tool in the cryptanalysis of cryptographic hash functions. It was conceived to attack AES like functions such as Whirlpool and Grøstl. The Rebound Attack is a type of statistical attack on hash functions, using techniques such as rotational and differential cryptanalysis to find collisions
  • 8. Pros & Cons  Pros :  making it harder for an attacker to break passwords  making it harder for an attacker to digital signature  making it harder for an attacker to verification code  Cons :
  • 9. Conclusion We analyzed the Grøstl hash functions: Using the start-from-the middle rebound technique, we have shown a collision attack on the Grøstl-256 hash function reduced to 5 rounds and 6 rounds with 248 and 2112 time complexities. Furthermore, semi-free-start collision attacks on the Grøstl- 224 and -256 hash functions reduced to 7 rounds, on the Grøstl-224 and -256 compression functions reduced to 8 rounds were shown and some improvements of distinguishers of the permutations were presented. While our analysis shows (semi-free-start) collision attacks for up to seven rounds which leaves just three rounds of security margin, it does not pose a direct threat to the full Grøstl hash or compression function.
  • 10. Hull Click Human Identification Protocol  This protocol is mainly about identification of human using Convex Hull Algorithm.  Using Convex Hull Algorithm, Human identification can be collected.
  • 11. Convex Hull Algorithm  Mainly convex hull algorithm is about some random points within a exact area which is a polygon. but specialty is the inner angles wont be more a 180 degree.  And the are must cover all the other points.  Using this algorithm human’s face or finger prints are detected. face becomes divided into some points like, distance among eyes, nose, mouth or other things. 
  • 12. Human identification protocol CHC protocol  C is the computer or the server that will detect the identification.  H is the human, who is to be identified.  C then repeats the process and accepts or rejects.  Let there are n=30, m=25 Secret icons or labels are = {7, 15, 27, 30}
  • 13. Attack-01  The possibility of of getting secret label is:  The possibility of getting non-secret labels is:
  • 14. Cont…  Simulation results for Attack 01 is like below:
  • 15. Cont…  Output of attacks 02..