Page Summary
lusercop.livejournal.com - (no subject)
nothings.livejournal.com - (no subject)
paracelsvs.livejournal.com - (no subject)
mskala.livejournal.com - (no subject)
mskala.livejournal.com - (no subject)
tongodeon.livejournal.com - (no subject)
mskala.livejournal.com - (no subject)
ronebofh.livejournal.com - (no subject)
paracelsvs.livejournal.com - (no subject)
mskala.livejournal.com - (no subject)
paracelsvs.livejournal.com - (no subject)
Style Credit
- Style: Blue for Motion by
- Resources: Wordpress Motion
Expand Cut Tags
No cut tags
no subject
Date: 2005-02-16 09:57 am (UTC)no subject
Date: 2005-02-16 01:49 pm (UTC)no subject
Date: 2005-02-16 01:52 pm (UTC)no subject
Date: 2005-02-16 01:56 pm (UTC)In the case of MD5, which is a 128-bit function, the theoretical best possible security is 2^64, so SHA1 is still ahead of the best security MD5 ever claimed to achieve, on raw numbers - but raw numbers are the wrong thing to compare.
no subject
Date: 2005-02-16 02:00 pm (UTC)no subject
Date: 2005-02-16 07:35 pm (UTC)no subject
Date: 2005-02-16 07:58 pm (UTC)However: hash functions like SHA1 are normally used along with ciphers, in contexts where they are important to the security of the overall system. An example would be in SSL-protected Web connections, where if I can generate hash collisions, then I can take the valid signature from a certificate of a server I want to attack, instead attach it to a fake certificate of my own invention that also has the same hash value, and then use the fake certificate to authenticate to you. You think you're establishing a secure connection to Amazon, actually you're establishing a secure connection to me, you type in your credit card number, I capture it. The design of signature schemes sometimes means that I can do this general sort of thing just by creating collisions (two different strings with the same hash value) instead of the more difficult preimages (a string with a chosen hash value the same as the hash value of some other string I don't get to choose).
It is also possible to construct ciphers based on hash functions (the "Luby-Rackoff construction" is one thing to look up for more information on that), so that if you have a hash function you really trust then you can use it to build a cipher that is provably at least as strong, but those constructions tend to be inefficient, aren't used in practice, and aren't really a big concern.
no subject
Date: 2005-02-17 08:31 am (UTC)no subject
Date: 2005-02-17 01:07 pm (UTC)http://en.wikipedia.org/wiki/Cryptographic_hash_function
no subject
Date: 2005-02-17 02:00 pm (UTC)Also, secure hash functions as such do not have keys, whereas ciphers do. There are reasons you might sometimes want a secure hash that does have a key, but when you want that, you'd normally get it by using a standard unkeyed hash along with a construction like HMAC designed to make an unkeyed hash into a keyed hash.
As I mentioned, it's possible to build a cipher out of a hash function. The reverse is also true - there are ways to build a hash function based on a cipher. That's what Unix crypt(3) does.
no subject
Date: 2005-02-17 09:48 pm (UTC)