SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
從泛民初選
探討HASH保安
Hash Function

Can be applied to a block of data of any size
●produce a fixed-length output
●relatively easy to compute of any given value,
making both hardware and software
implementations practical
●
Hash Function

For any given hash code h, it is computationally
infeasible to find x such that H(x) = h. We called it
one-way property

●
Hash Function

For any given block x, it is computationally
infeasible to find y <> x with H(y) = H(x). This is
referred to as weak collision resistance.

●
Hash Function

It is computationally infeasible to find any pair (x,
y) such that H(x) = H(y). It is referred to as string
collision resistance.

●
Usage

Password Protection
●As a fingerprint of a message, data or file
(Checksum)
●Data Normalization (ID Generation)
●
Common Cracking

Pattern Finding
●Birthday Attack
●Dictionary Attack
●
Solution

publish the method and open the source for all
people to review.
●increase the length of the hash code.
●add salt
●
Possible Cracking of
HKID Hash Code
Server had been cracked
●Dictionary Attack
●man in middle (Depends on the Design)
●Virus
●Key Logger
●Binary or source code disclose
●
Workshop

openssl
●md5sum
●shasum
●Fun on cracking my 30000 hash codes
●
從泛民初選 探討Hash保安

Contenu connexe

En vedette

En vedette (7)

Tinyboy Updates on 1st quarter of 2015
Tinyboy Updates on 1st quarter of 2015Tinyboy Updates on 1st quarter of 2015
Tinyboy Updates on 1st quarter of 2015
 
Raspberry pi
Raspberry piRaspberry pi
Raspberry pi
 
How Open Source / Open Technology Could Help On Your Project
How Open Source / Open Technology Could Help On Your ProjectHow Open Source / Open Technology Could Help On Your Project
How Open Source / Open Technology Could Help On Your Project
 
Raspberry pi workshop
Raspberry pi workshopRaspberry pi workshop
Raspberry pi workshop
 
Some cases of open source products that have great impact in recent years
Some cases of open source products that have great impact in recent yearsSome cases of open source products that have great impact in recent years
Some cases of open source products that have great impact in recent years
 
Tinyboy Project - A 3D printer for student
Tinyboy Project - A 3D printer for studentTinyboy Project - A 3D printer for student
Tinyboy Project - A 3D printer for student
 
3D Printing Workshop
3D Printing Workshop3D Printing Workshop
3D Printing Workshop
 

Similaire à 從泛民初選 探討Hash保安

secure hash function for authentication in CNS
secure hash function for authentication in CNSsecure hash function for authentication in CNS
secure hash function for authentication in CNS
NithyasriA2
 
Cryptography and Network Security Principles and Practice.docx
Cryptography and Network Security Principles and Practice.docxCryptography and Network Security Principles and Practice.docx
Cryptography and Network Security Principles and Practice.docx
richardnorman90310
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
Basudev Saha
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
Yusuf Uzun
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 

Similaire à 從泛民初選 探討Hash保安 (20)

secure hash function for authentication in CNS
secure hash function for authentication in CNSsecure hash function for authentication in CNS
secure hash function for authentication in CNS
 
HASH FUNCTIONS.pdf
HASH FUNCTIONS.pdfHASH FUNCTIONS.pdf
HASH FUNCTIONS.pdf
 
Cryptography and Network Security Principles and Practice.docx
Cryptography and Network Security Principles and Practice.docxCryptography and Network Security Principles and Practice.docx
Cryptography and Network Security Principles and Practice.docx
 
Secure hash function
Secure hash functionSecure hash function
Secure hash function
 
Hashing
HashingHashing
Hashing
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Cryptography-Hash-Functions.pptx
Cryptography-Hash-Functions.pptxCryptography-Hash-Functions.pptx
Cryptography-Hash-Functions.pptx
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
 
2 Cryptographic_Hash_Functions.pptx
2 Cryptographic_Hash_Functions.pptx2 Cryptographic_Hash_Functions.pptx
2 Cryptographic_Hash_Functions.pptx
 
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...Information and network security 38 birthday attacks and security of hash fun...
Information and network security 38 birthday attacks and security of hash fun...
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
 
Password cracking
Password crackingPassword cracking
Password cracking
 
Network security cryptographic hash function
Network security  cryptographic hash functionNetwork security  cryptographic hash function
Network security cryptographic hash function
 
01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 

Plus de Wan Leung Wong

Virtualization - Kernel Virtual Machine (KVM)
Virtualization - Kernel Virtual Machine (KVM)Virtualization - Kernel Virtual Machine (KVM)
Virtualization - Kernel Virtual Machine (KVM)
Wan Leung Wong
 

Plus de Wan Leung Wong (18)

用Flutter 開發Linux Desktop Application
用Flutter 開發Linux Desktop Application用Flutter 開發Linux Desktop Application
用Flutter 開發Linux Desktop Application
 
iOS Development, with Swift and XCode
iOS Development, with Swift and XCodeiOS Development, with Swift and XCode
iOS Development, with Swift and XCode
 
HTML, Javascript and AJAX
HTML, Javascript and AJAXHTML, Javascript and AJAX
HTML, Javascript and AJAX
 
Package Management Systems on GNU/Linux
Package Management Systems on GNU/LinuxPackage Management Systems on GNU/Linux
Package Management Systems on GNU/Linux
 
Tinyboy Project - A 3D Printer for Education
Tinyboy Project - A 3D Printer for EducationTinyboy Project - A 3D Printer for Education
Tinyboy Project - A 3D Printer for Education
 
HKCOTA 海外見聞錄 - 思考香港IT未來發展 - HKOSCON 2015
HKCOTA 海外見聞錄 - 思考香港IT未來發展 - HKOSCON 2015HKCOTA 海外見聞錄 - 思考香港IT未來發展 - HKOSCON 2015
HKCOTA 海外見聞錄 - 思考香港IT未來發展 - HKOSCON 2015
 
Ecosystem of IT Industry - Sitcon x HK - 2016
Ecosystem of IT Industry - Sitcon x HK - 2016Ecosystem of IT Industry - Sitcon x HK - 2016
Ecosystem of IT Industry - Sitcon x HK - 2016
 
Hacking Saturday 2018-05 - flutter
Hacking Saturday 2018-05 - flutterHacking Saturday 2018-05 - flutter
Hacking Saturday 2018-05 - flutter
 
What is IT - Sitcoin x HK 2018
What is IT - Sitcoin x HK 2018What is IT - Sitcoin x HK 2018
What is IT - Sitcoin x HK 2018
 
Hacking Saturday - 2018-05
Hacking Saturday - 2018-05Hacking Saturday - 2018-05
Hacking Saturday - 2018-05
 
中國曆法 Barcamphk - 2017
中國曆法 Barcamphk - 2017中國曆法 Barcamphk - 2017
中國曆法 Barcamphk - 2017
 
Ecosystem of IT Industry - Sitcon x HK - 2017
Ecosystem of IT Industry - Sitcon x HK - 2017Ecosystem of IT Industry - Sitcon x HK - 2017
Ecosystem of IT Industry - Sitcon x HK - 2017
 
Security Solution - Luckey Application on Crypto-currency and Personal Bankin...
Security Solution - Luckey Application on Crypto-currency and Personal Bankin...Security Solution - Luckey Application on Crypto-currency and Personal Bankin...
Security Solution - Luckey Application on Crypto-currency and Personal Bankin...
 
Tinyboy, A 3D Printer for Student
Tinyboy, A 3D Printer for StudentTinyboy, A 3D Printer for Student
Tinyboy, A 3D Printer for Student
 
Virtualization - Kernel Virtual Machine (KVM)
Virtualization - Kernel Virtual Machine (KVM)Virtualization - Kernel Virtual Machine (KVM)
Virtualization - Kernel Virtual Machine (KVM)
 
DIY Gateway
DIY GatewayDIY Gateway
DIY Gateway
 
VM - Talk
VM - TalkVM - Talk
VM - Talk
 
中文輸入法簡介、發展及困難
中文輸入法簡介、發展及困難中文輸入法簡介、發展及困難
中文輸入法簡介、發展及困難
 

Dernier

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

從泛民初選 探討Hash保安