mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-25 22:04:06 -06:00
vault backup: 2022-08-16 13:10:13
This commit is contained in:
parent
25c9993dd8
commit
869a9aa61b
81
content/notes/06-hashing-binary-public-key-cryptography.md
Normal file
81
content/notes/06-hashing-binary-public-key-cryptography.md
Normal file
@ -0,0 +1,81 @@
|
|||||||
|
---
|
||||||
|
title: "06-hashing-binary-public-key-cryptography"
|
||||||
|
aliases:
|
||||||
|
tags:
|
||||||
|
- lecture
|
||||||
|
- comp210
|
||||||
|
sr-due: 2022-08-19
|
||||||
|
sr-interval: 3
|
||||||
|
sr-ease: 250
|
||||||
|
---
|
||||||
|
|
||||||
|
# news
|
||||||
|
- pegasus project
|
||||||
|
- cutting internet cables
|
||||||
|
|
||||||
|
# Hash function
|
||||||
|
- yields a small, districtive value (hash or digest) from an arbitrarily sized input.
|
||||||
|
- one way function
|
||||||
|
- non-invertable
|
||||||
|
- uniform size (each ouput eqaully likely)
|
||||||
|
- deterministic (same input maps to same output)
|
||||||
|
- possibility of collisions (b-day paradox, potential attacks)
|
||||||
|
|
||||||
|
message => hash() => hash
|
||||||
|
|
||||||
|
also
|
||||||
|
- can be used for data structures
|
||||||
|
- [hash-map](notes/hash-map.md)
|
||||||
|
- lots of theory
|
||||||
|
- often use modular arithmetic
|
||||||
|
- usually have more complicated algorithms than mod
|
||||||
|
|
||||||
|
## in crypto
|
||||||
|
- needs to be
|
||||||
|
- impossible to reverse
|
||||||
|
- difficult to find collision
|
||||||
|
- uniform length output (tunable)
|
||||||
|
- must account for every bit of information in a message
|
||||||
|
- must be sensitive to changes input (avalancge effect)
|
||||||
|
- ouput should no contain apparent iinformation (appears random)
|
||||||
|
- easily computed (usually)
|
||||||
|
- for passowords should be slow
|
||||||
|
- makes brute force attacks take time
|
||||||
|
- key strechting (repeated application of hash)
|
||||||
|
- use complex memory access patterns to defeat esp
|
||||||
|
|
||||||
|
effectively a digital fingerprint;
|
||||||
|
|
||||||
|
## collision probability
|
||||||
|
|
||||||
|
$v = a^l$
|
||||||
|
|
||||||
|
- 
|
||||||
|
- 
|
||||||
|
- 
|
||||||
|
|
||||||
|
can also be used to compare complexity of passwords
|
||||||
|
- 
|
||||||
|
- should have about 80 bits of entropy
|
||||||
|
|
||||||
|
|
||||||
|
- 
|
||||||
|
|
||||||
|
## uses of hashing
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
# Binary
|
||||||
|
|
||||||
|
|
||||||
|
# One-time-pads
|
||||||
|
|
||||||
|
|
||||||
|
## limitations
|
||||||
|
|
||||||
|
|
||||||
|
# assymetric cryptography
|
||||||
|
|
||||||
|
|
||||||
|
# digital signatures
|
||||||
|
|
||||||
@ -30,3 +30,4 @@ No final exam
|
|||||||
- [03-threats-social-engineering-and-failures](notes/03-threats-social-engineering-and-failures.md)
|
- [03-threats-social-engineering-and-failures](notes/03-threats-social-engineering-and-failures.md)
|
||||||
- [04-authentication-authorisation-passwords](notes/04-authentication-authorisation-passwords.md)
|
- [04-authentication-authorisation-passwords](notes/04-authentication-authorisation-passwords.md)
|
||||||
- [05-cryptography](notes/05-cryptography.md)
|
- [05-cryptography](notes/05-cryptography.md)
|
||||||
|
-
|
||||||
Loading…
Reference in New Issue
Block a user