Notes - Computer Security MT24, Example hash functions



Flashcards

LM (Lan Manager)

@Define the components of the LM hash in terms of its:

  • Input
  • Output
  • Operation

  • Input: Maximum of 14 characters of printable ASCII
  • Output: 128 bit hash
  • Operation:
    • Null-pad the password to 14 characters
    • Force any lowercase letters to upper case
    • Split into 7-byte halves, each of which makes a 56-bit DES key
    • Use the DES key to encrypt a certain, fixed 64-bit block
    • Concatenate the two DES encryptions to make a 128 bit hash.

scrypt

How does the scrypt algorithm slow down brute-force attacks on its hashes?


The algorithm uses a lot of memory, by creating many pseudorandom blocks and then combining them in a pseudorandom order.

MD4

@Define the components of the MD4 hash in terms of its:

  • Inputs
  • Outputs
  • Construction (summary)

  • Inputs: 512 bits (16 words of 32 bits)
  • Output: 128 bits
  • Construction: Iterating a compression function and using MD padding

MD5

  • Successor to MD4, was also insecure.

SHA-1

  • Also insecure, designed by the NSA.

SHA-2

  • Larger output compared to MD4, MD5, SHA-1 and also bigger input blocks.
  • Used in Bitcoin.

SHA-3

  • Different construction compared to SHA-2.
  • NSA-free!
  • Allows arbitrary-length input and output.
  • Has adjustable security parameters.



Related posts