mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-25 05:44:06 -06:00
vault backup: 2022-08-16 13:10:13
This commit is contained in:
parent
25c9993dd8
commit
869a9aa61b
81
content/notes/06-hashing-binary-public-key-cryptography.md
Normal file
81
content/notes/06-hashing-binary-public-key-cryptography.md
Normal file
@ -0,0 +1,81 @@
|
||||
---
|
||||
title: "06-hashing-binary-public-key-cryptography"
|
||||
aliases:
|
||||
tags:
|
||||
- lecture
|
||||
- comp210
|
||||
sr-due: 2022-08-19
|
||||
sr-interval: 3
|
||||
sr-ease: 250
|
||||
---
|
||||
|
||||
# news
|
||||
- pegasus project
|
||||
- cutting internet cables
|
||||
|
||||
# Hash function
|
||||
- yields a small, districtive value (hash or digest) from an arbitrarily sized input.
|
||||
- one way function
|
||||
- non-invertable
|
||||
- uniform size (each ouput eqaully likely)
|
||||
- deterministic (same input maps to same output)
|
||||
- possibility of collisions (b-day paradox, potential attacks)
|
||||
|
||||
message => hash() => hash
|
||||
|
||||
also
|
||||
- can be used for data structures
|
||||
- [hash-map](notes/hash-map.md)
|
||||
- lots of theory
|
||||
- often use modular arithmetic
|
||||
- usually have more complicated algorithms than mod
|
||||
|
||||
## in crypto
|
||||
- needs to be
|
||||
- impossible to reverse
|
||||
- difficult to find collision
|
||||
- uniform length output (tunable)
|
||||
- must account for every bit of information in a message
|
||||
- must be sensitive to changes input (avalancge effect)
|
||||
- ouput should no contain apparent iinformation (appears random)
|
||||
- easily computed (usually)
|
||||
- for passowords should be slow
|
||||
- makes brute force attacks take time
|
||||
- key strechting (repeated application of hash)
|
||||
- use complex memory access patterns to defeat esp
|
||||
|
||||
effectively a digital fingerprint;
|
||||
|
||||
## collision probability
|
||||
|
||||
$v = a^l$
|
||||
|
||||
- 
|
||||
- 
|
||||
- 
|
||||
|
||||
can also be used to compare complexity of passwords
|
||||
- 
|
||||
- should have about 80 bits of entropy
|
||||
|
||||
|
||||
- 
|
||||
|
||||
## uses of hashing
|
||||

|
||||
|
||||
|
||||
# Binary
|
||||
|
||||
|
||||
# One-time-pads
|
||||
|
||||
|
||||
## limitations
|
||||
|
||||
|
||||
# assymetric cryptography
|
||||
|
||||
|
||||
# digital signatures
|
||||
|
||||
@ -30,3 +30,4 @@ No final exam
|
||||
- [03-threats-social-engineering-and-failures](notes/03-threats-social-engineering-and-failures.md)
|
||||
- [04-authentication-authorisation-passwords](notes/04-authentication-authorisation-passwords.md)
|
||||
- [05-cryptography](notes/05-cryptography.md)
|
||||
-
|
||||
Loading…
Reference in New Issue
Block a user