SlideShare une entreprise Scribd logo
1  sur  13
Welcome Presentation on Cryptography & Information Security
Topic 5 List cryptographic hash algorithms and list their applications. Discuss MD5 hash algorithm or any other hash algorithm in detail. Submitted By: Muhammad AshikIqbal M.Sc. in CSE ID: 092-25-127 DIU ashik.email@gmail.com http://ashikiqbal.blogspot.com
Cryptographic Hash Algorithms
List of Hash Algorithms
Applications of Hash Algorithms Used Alone File integrity verification Public key fingerprint Password storage Combined with encryption functions
MD5 Message-Digest algorithm 5
MD5 Designed by Ronald Rivest in 1991 and replaces an earlier hash function MD4 MD5 is a widely used cryptographic hash function 128-bit hash function Uses 512 bit blocks Uses 128-bit keys or states The 128-bit key is split into 4 sub-keys of 32 bits each Four rounds are used to produce the hash In each round addition, XOR, AND, OR, rotation are used
MD5 Example hello 5d41402abc4b2a76b9719d911017c592
MD5 Algorithms 2. Append length (64bits) 1. Append padding bits (to 448 mod 512) 3. Initialize MD buffer Word A = 01 23 45 67 Word B = 89 AB CD EF Word C = FE DC BA 98 Word D = 76 54 32 10
MD5 Algorithms F(X,Y,Z) = (X ∧ Y) ∨ (¬X ∧ Z) G(X,Y,Z) = (X ∧ Z) ∨ (Y ∧ ¬Z) H(X,Y,Z) = X ⊕ Y ⊕ Z I(X,Y,Z) = Y ⊕ (X ∨ ¬Z) Round 0: Steps 0 to 15 Round 1: Steps 16 to 31 Round 2: Steps 32 to 47 16 steps Round 4: Steps 47 to 63 X[k] = M [q*16+k] (32 bit) Constructed from sine function
MD5 Applications MD5 has been employed in a wide variety of security applications and is also commonly used to check the integrity of files Used in the software world to provide some assurance that a transferred file has arrived intact Unix-based operating systems include MD5 sum utilities in their distribution packages MD5 can provide error-checking functionality It recognizes corrupt or incomplete download, which becomes more likely when downloading larger files Widely used to store passwords after adding salt
MD5 Attack History Dobbertin “almost” able to break MD5 using his MD4 attack in 1996 Showed that MD5 might be at risk In 2004, Wang published one MD5 collision No explanation of method was given Based on one collision, Wang’s method was reverse engineered by Australian team Ironically, this reverse engineering work has been primary source to improve Wang’s attack
Thank You

Contenu connexe

Tendances

01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
GnanalakshmiV
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
Yusuf Uzun
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
Basudev Saha
 

Tendances (20)

01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt01204427-Hash_Crypto (1).ppt
01204427-Hash_Crypto (1).ppt
 
Cryptographic hash function md5
Cryptographic hash function md5Cryptographic hash function md5
Cryptographic hash function md5
 
MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
Hash Function
Hash FunctionHash Function
Hash Function
 
MD5
MD5MD5
MD5
 
Message authentication with md5
Message authentication with md5Message authentication with md5
Message authentication with md5
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
 
Md5
Md5Md5
Md5
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Hash
HashHash
Hash
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
 
6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
 
Hashing
HashingHashing
Hashing
 
Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in CBasic explanation to md5 implementation in C
Basic explanation to md5 implementation in C
 
Cryptography - Simplified - Hash Functions
Cryptography - Simplified - Hash FunctionsCryptography - Simplified - Hash Functions
Cryptography - Simplified - Hash Functions
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
Network Security(MD5)
Network Security(MD5)Network Security(MD5)
Network Security(MD5)
 

Similaire à Cryptography Ashik

An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
paperpublications3
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
koolkampus
 

Similaire à Cryptography Ashik (20)

Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
An Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information SecurityAn Enhanced Message Digest Hash Algorithm for Information Security
An Enhanced Message Digest Hash Algorithm for Information Security
 
Hash_Crypto.ppt
Hash_Crypto.pptHash_Crypto.ppt
Hash_Crypto.ppt
 
A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5
 
Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3Cryptography and Message Authentication NS3
Cryptography and Message Authentication NS3
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Ch12
Ch12Ch12
Ch12
 
Moein
MoeinMoein
Moein
 
Cryprography Assignment
Cryprography AssignmentCryprography Assignment
Cryprography Assignment
 
HASH FUNCTIONS.pdf
HASH FUNCTIONS.pdfHASH FUNCTIONS.pdf
HASH FUNCTIONS.pdf
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 
Data encryption algorithm(edit)
Data encryption algorithm(edit)Data encryption algorithm(edit)
Data encryption algorithm(edit)
 

Plus de Ashik Iqbal

Al quran-er-arobi-shikhi
Al quran-er-arobi-shikhiAl quran-er-arobi-shikhi
Al quran-er-arobi-shikhi
Ashik Iqbal
 
Virtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryVirtual Memory vs Cache Memory
Virtual Memory vs Cache Memory
Ashik Iqbal
 
Pipeline Mechanism
Pipeline MechanismPipeline Mechanism
Pipeline Mechanism
Ashik Iqbal
 
Profit From Ramadan
Profit From RamadanProfit From Ramadan
Profit From Ramadan
Ashik Iqbal
 
Mobile/Digital Wallet
Mobile/Digital WalletMobile/Digital Wallet
Mobile/Digital Wallet
Ashik Iqbal
 
Handbook Of Islamic Banking
Handbook Of Islamic BankingHandbook Of Islamic Banking
Handbook Of Islamic Banking
Ashik Iqbal
 

Plus de Ashik Iqbal (16)

Document Archiving & Sharing System
Document Archiving & Sharing SystemDocument Archiving & Sharing System
Document Archiving & Sharing System
 
Document Archiving & Sharing System
Document Archiving & Sharing SystemDocument Archiving & Sharing System
Document Archiving & Sharing System
 
We Forgot
We ForgotWe Forgot
We Forgot
 
Al quran-er-arobi-shikhi
Al quran-er-arobi-shikhiAl quran-er-arobi-shikhi
Al quran-er-arobi-shikhi
 
Virtual Memory vs Cache Memory
Virtual Memory vs Cache MemoryVirtual Memory vs Cache Memory
Virtual Memory vs Cache Memory
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Commercially Available Fiber Optic Cables
Commercially Available Fiber Optic CablesCommercially Available Fiber Optic Cables
Commercially Available Fiber Optic Cables
 
Pipeline Mechanism
Pipeline MechanismPipeline Mechanism
Pipeline Mechanism
 
Advanced Artificial Intelligence
Advanced Artificial IntelligenceAdvanced Artificial Intelligence
Advanced Artificial Intelligence
 
Profit From Ramadan
Profit From RamadanProfit From Ramadan
Profit From Ramadan
 
Mobile/Digital Wallet
Mobile/Digital WalletMobile/Digital Wallet
Mobile/Digital Wallet
 
Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
 
Prophets Graves
Prophets GravesProphets Graves
Prophets Graves
 
My Abokash
My AbokashMy Abokash
My Abokash
 
Handbook Of Islamic Banking
Handbook Of Islamic BankingHandbook Of Islamic Banking
Handbook Of Islamic Banking
 
The Window
The WindowThe Window
The Window
 

Dernier

The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
heathfieldcps1
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Dernier (20)

24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Benefits and Challenges of OER by Shweta Babel.pptx
Benefits and Challenges of OER by Shweta Babel.pptxBenefits and Challenges of OER by Shweta Babel.pptx
Benefits and Challenges of OER by Shweta Babel.pptx
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 

Cryptography Ashik

  • 1. Welcome Presentation on Cryptography & Information Security
  • 2. Topic 5 List cryptographic hash algorithms and list their applications. Discuss MD5 hash algorithm or any other hash algorithm in detail. Submitted By: Muhammad AshikIqbal M.Sc. in CSE ID: 092-25-127 DIU ashik.email@gmail.com http://ashikiqbal.blogspot.com
  • 4. List of Hash Algorithms
  • 5. Applications of Hash Algorithms Used Alone File integrity verification Public key fingerprint Password storage Combined with encryption functions
  • 7. MD5 Designed by Ronald Rivest in 1991 and replaces an earlier hash function MD4 MD5 is a widely used cryptographic hash function 128-bit hash function Uses 512 bit blocks Uses 128-bit keys or states The 128-bit key is split into 4 sub-keys of 32 bits each Four rounds are used to produce the hash In each round addition, XOR, AND, OR, rotation are used
  • 8. MD5 Example hello 5d41402abc4b2a76b9719d911017c592
  • 9. MD5 Algorithms 2. Append length (64bits) 1. Append padding bits (to 448 mod 512) 3. Initialize MD buffer Word A = 01 23 45 67 Word B = 89 AB CD EF Word C = FE DC BA 98 Word D = 76 54 32 10
  • 10. MD5 Algorithms F(X,Y,Z) = (X ∧ Y) ∨ (¬X ∧ Z) G(X,Y,Z) = (X ∧ Z) ∨ (Y ∧ ¬Z) H(X,Y,Z) = X ⊕ Y ⊕ Z I(X,Y,Z) = Y ⊕ (X ∨ ¬Z) Round 0: Steps 0 to 15 Round 1: Steps 16 to 31 Round 2: Steps 32 to 47 16 steps Round 4: Steps 47 to 63 X[k] = M [q*16+k] (32 bit) Constructed from sine function
  • 11. MD5 Applications MD5 has been employed in a wide variety of security applications and is also commonly used to check the integrity of files Used in the software world to provide some assurance that a transferred file has arrived intact Unix-based operating systems include MD5 sum utilities in their distribution packages MD5 can provide error-checking functionality It recognizes corrupt or incomplete download, which becomes more likely when downloading larger files Widely used to store passwords after adding salt
  • 12. MD5 Attack History Dobbertin “almost” able to break MD5 using his MD4 attack in 1996 Showed that MD5 might be at risk In 2004, Wang published one MD5 collision No explanation of method was given Based on one collision, Wang’s method was reverse engineered by Australian team Ironically, this reverse engineering work has been primary source to improve Wang’s attack