+ All Categories
Home > Documents > Slides iAWACS09 Danchev-Maqableh CBHF

Slides iAWACS09 Danchev-Maqableh CBHF

Date post: 29-Apr-2015
Category:
Upload: majid-khan
View: 9 times
Download: 1 times
Share this document with a friend
39
Mahmoud Maqableh Stefan Dantchev Cryptanalysis of Chaos- Based Hash Function (CBHF) Durham University - UK
Transcript
Page 1: Slides iAWACS09 Danchev-Maqableh CBHF

Mahmoud Maqableh Stefan Dantchev

Cryptanalysis of Chaos-Based Hash Function (CBHF)

Durham University - UK

Page 2: Slides iAWACS09 Danchev-Maqableh CBHF

OutlineOutline

Introduction

Literature Survey

Chaos-Based Hash Function (CBHF)

Cryptanalysis of CBHF

Conclusion

Future Works

Page 3: Slides iAWACS09 Danchev-Maqableh CBHF

Introduction

Page 4: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptography is the art and science of encrypt and decrypt data to be protected while it store or transfer over insecure networks.

Cryptography

Encryption AlgorithmEncryption Algorithm

CiphertextPlaintext

؛؛L„èL„èىىfY’fY’جقجق**kUu?kUu?

ؤإ# ؤإ#ق TE¦FTE¦F،،¬ ¥m¬ ¥mآآhhقCoLCoLڑڑ ے; ے;و �µµë‹‡}²U�닇}²Uو ٌٌèè/ƒ/ƒجىجىWWژضژضQQککؤؤùù©]©]ههU7ë$FQU7ë$FQ••پپâ²îL$â²îL$أأ¼¼üüھھ|�|�ƒƒچچèèممz|z|rPµôrPµô،،³÷° ³÷° UU ٌٌèèککQQژضژضW W @;D;{@;D;{ززk’k’ گ~ گ~ف �43�43ف

Cryptanalysis is the arts and sciences of studying and analyzing cryptographic techniques to break them.

Page 5: Slides iAWACS09 Danchev-Maqableh CBHF

CryptologyCryptology

CryptographyCryptography CryptanalysisCryptanalysis

Asymmetric Symmetric Hash Function

Confidentiality

Digital SignatureKey Exchange

Keyed HashUn-keyed HashStream CipherBlock Cipher

Cryptology Parts

Page 6: Slides iAWACS09 Danchev-Maqableh CBHF

A dynamical system is chaotic if

1. it is sensitive to initial conditions,

2. it is topologically mixing, and

3. its periodic orbits are dense.

Chaos Theory

is a branch of mathematics that studies the behaviour of certain dynamical systems, which may be highly sensitive to initial conditions.

Page 7: Slides iAWACS09 Danchev-Maqableh CBHF

Chaos Theory

Examples of Chaotic Maps or Attractors are:

1. Lorenz Attractors.

2. Logistic Map.

3. Tent Map.

4. Henon Map.

Page 8: Slides iAWACS09 Danchev-Maqableh CBHF

Lorenz Attractors

dx/dt = delta * (y - x).

dy/dt = r * x - y - x * z.

dz/dt = x * y - b * z.

Page 9: Slides iAWACS09 Danchev-Maqableh CBHF

Logistic Map

nnn xrxx

xr

1

1,0 ,4,0

1

0

Page 10: Slides iAWACS09 Danchev-Maqableh CBHF

Tent Map

x [0, 1]

r [0, 2]

Page 11: Slides iAWACS09 Danchev-Maqableh CBHF

Literature Survey

Page 12: Slides iAWACS09 Danchev-Maqableh CBHF

Chaos in Cryptography

Chaos theory has attracted the cryptography field due to it characteristics, such as deterministic nature, unpredictable, random-look nature and its sensitivity to initial value

Page 13: Slides iAWACS09 Danchev-Maqableh CBHF

Chaos in Cryptography

In 2007, J. Zhang, X. Wang, and W. Zhang described it is weak collision resistance because the hash space will not fully covered from these three points and if the message is too short the key could be attacked.

In 2008, a research group published paper about design new hash function based on Chaos theory (CHA-1),

This algorithm has two disadvantages:

1) CHA-1 algorithm build based on two simple functions, which are similar to design of SHA-1 and it could effect by Wang et al. attack.

Page 14: Slides iAWACS09 Danchev-Maqableh CBHF

Chaos in Cryptography

2) CHA-1 is three times slower than SHA-1 and it will be slower with increase the message size.

Recently, M. Amin, O.S. Faragallah, and A.A. Abd El-Latif (2009) suggested simple implementation to un-keyed hash function using tent map (CBHF), they explained the general idea of their new hash function in one paragraph, without given enough details how it works.

Mt …… Mn-1M0 M1

T T T T

…......

K0 H0 K1H1 K2

HtKt+1Kt

Kn-1Hn-1 Hn

Page 15: Slides iAWACS09 Danchev-Maqableh CBHF

Chaos-Based Hash Function (CBHF)

Page 16: Slides iAWACS09 Danchev-Maqableh CBHF

Chaos-Based Hash Function (CBHF)

A Cryptography hash function should be:• Collision-free • Public• The security of the hash function shouldn't in the secure of

the process

M. Amin et al. suggested a new hash function based on chaos theory for cryptography applications.

They suggested simple implementation of an unkeyed hash function, using well known chaotic tent map, and can be use as keyed hash function

Page 17: Slides iAWACS09 Danchev-Maqableh CBHF

Chaos-Based Hash Function (CBHF)

The proposed hash function works by dividing the input message into 1024-bit blocks

If the last message block size is less than 1024 bit, it will padded by adding a single one followed by the necessary number of zeros.

Message

Mt …… Mn-1M0 M1 …......

T T T T

K0 H0 K1H1 K2

HtKt+1Kt

Kn-1Hn-1 Hn

… …

Page 18: Slides iAWACS09 Danchev-Maqableh CBHF

Chaos-Based Hash Function (CBHF)

The final hash value will be128 bits

The final hash value is calculated as:

Hn = Kn-1 Hn-1 .

In general,

Hn = K0 H1 H2 H3 ..... Hn-1 .

where K0 is the initial value of the tent map

Page 19: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF

Page 20: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF

Unkeyed Version

The tent map T has two inputs (Ki, Mi). It is not clear from the

paper, which one corresponds to x and which one to r. so, in our

analysis, we will work the two cases out separately.

In any case, we work under the following assumptions:

1. The initial value K0 is public in unkeyed hash function

2. Either Hi = TMi (Ki) OR Hi = Tki (Mi).

3. Ki = Ki-1 Hi-1, thus

Hn = K0 H1 H2 H3 ..... Hn-1 .

Page 21: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF

We will now show how to break the CBHF in a very strong

sense.

Given any (partial) message M`0 M`1 ………… M`n-2,

then we can compute the last block M`n-1,so that the hash value

of M` is the same as value of M.

For this end, we first calculate K`n-1, then we calculate the value

of the last block message M`n-1 satisfying the following:

Hn = K`n-1 H`n-1 H`n-1 = K`n-1 Hn

Page 22: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF

Mn-2` Mn-1 `M0` M1` …......

T T T T

K0` H0

` K1` H1

` K2` Hn-2`Kn-2` Kn-1` Hn-1` Hn`

Mn-1 `

H`n=Hn

Hn = Kn-1 Hn-1 H`n = K`n-1 H`n-1

Page 23: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF

We know that H`n-1 is obtained in one of the following two

ways, which we consider separately.

1- H`n-1 = TM`n-1(K`n-1)

H`n-1 = M`n-1K, K = K`n-1 OR 1-K`n-1

M`n-1 = (H`n-1 / K)

Page 24: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF

2- H`n-1 = TK`n-1(M`n-1)

H`n-1 = K`n-1M, M = M`n-1 OR 1-M`n-1

M = (H`n-1 / K`n-1)

Then we calculate the value of M`n-1 as follow:

Page 25: Slides iAWACS09 Danchev-Maqableh CBHF

Examples OF Unkeyed version of CBHF

Message`

Mn-2`M0` M1` …......

T T T T

K0` H0

` K1` H1

` K2` Hn-2`Kn-2` 0.50 Hn-1`

0.625

Example one – case 1: H`n-1 = TM`n-1(K`n-1)

Page 26: Slides iAWACS09 Danchev-Maqableh CBHF

Example OF Unkeyed version of CBHF

Mn-2` 0.25M0` M1` …......

T T T T

K0` H0

` K1` H1

` K2` Hn-2`Kn-2` 0.50 0.125 0.625

Message` Mn-1 `

Page 27: Slides iAWACS09 Danchev-Maqableh CBHF

Example OF Unkeyed version of CBHF

Check the values:

Page 28: Slides iAWACS09 Danchev-Maqableh CBHF

Example OF Unkeyed version of CBHF

Message`

Mn-2`M0` M1` …......

T T T T

K0` H0

` K1` H1

` K2` Hn-2`Kn-2` 0.625 Hn-1`

0.75

Example two – case 2 : H`n-1 = TK`n-1(M`n-1)

Page 29: Slides iAWACS09 Danchev-Maqableh CBHF

Example OF Unkeyed version of CBHF

Page 30: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF - Unkeyed Version

Real Collision Example of Unkeyed Version of CBHF

Page 31: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF

Keyed Version

In this case, the initial value K0 is unknown key.

The final hash value Hn(M) is known

So, we can append any new part to the original message M, say

M`=MnMn+1 ……Mn+m-2

Then use the procedure of Unkeyed CBHF to determine the

value of the last block Mn+m-1

Hn+m = Hn.

Page 32: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF - Keyed Version

Message

Mn-1M0 M1 …......

T T T T

K0

H0 K1H1 K2

Hn-1Kn-1

Kn

Hn+1 Kn+m-1

Mn

T

Hn+m-1 Hn+m

Mn+m-1

Kn+1

…......

Mn Mn+m-1…......

Hn

Page 33: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF - Keyed Version

Real Collision Example of Keyed Version of CBHF

Page 34: Slides iAWACS09 Danchev-Maqableh CBHF

Cryptanalysis of CBHF - Keyed Version

Real Collision Example of Keyed Version of CBHF

Page 35: Slides iAWACS09 Danchev-Maqableh CBHF

Conclusion

Page 36: Slides iAWACS09 Danchev-Maqableh CBHF

We have shown how to break the recently proposed Keyed and

Unkeyed versions of hash function based on chaos theory (CBHF).

Our attacks show that we can easily find two totally different

messages that have the same hash value.

Therefore, both the keyed and the Unkeyed hash versions of CBHF

are totally unsecure.

Conclusion

Page 37: Slides iAWACS09 Danchev-Maqableh CBHF

Future works

Page 38: Slides iAWACS09 Danchev-Maqableh CBHF

Finding and designing new hash functions that work better than the

current existences hash functions.

Utilize Chaotic Maps to design new cryptography algorithms.

Finding and designing framework of new hash functions based on

Chaotic Maps

Future works

Page 39: Slides iAWACS09 Danchev-Maqableh CBHF

Happy to answer questions and hear comments

Thanks for Listening


Recommended