Information Security

Hashes

11 minute read



Notice a tyop typo? Please submit an issue or open a PR.

Hashes

Hash Functions

A hash function can be applied to a block of data of any size and produces a fixed-size output, typically in the range of 128-512 bits. Given a message mm, computing the hash H(m)H(m) should be very easy.

These properties make hash functions practical for security applications. We need our hash functions to be able to handle arbitrary input and compute their output efficiently.

The following properties are required for hash functions to be secure.

One-Way Function

Given H(m)H(m), it should be computationally infeasible to find mm. We call such a non-invertible function a one-way function.

Alice can authenticate a message by hashing a secret value and appending it to the message. If an attacker intercepts this message and the hash function is not one-way, then the attacker can find the input that computes the hash value. That is, the attacker can invert the hash function to obtain the secret value from its hash.

Weak Collision-Resistant Property

Given input data m1m1, it should be computationally infeasible to find another input value m2m1m2 \neq m1, such that H(m1)=H(m2)H(m1) = H(m2). This property of hash functions is the weak collision-resistant property.

Suppose that Alice wants to send a message to Bob, and she wants to ensure that the message arrives to him unmodified. She can create an encrypted hash of the message and send both the message and the hash to Bob.

When the attacker intercepts the message and encrypted hash code, they can recompute the (unencrypted) hash code of the message. If the weak collision property is not present, then the attacker can find another message such that the hash value of that message is the same as the hash value of the original message.

Even though the hash code is encrypted, the attacker only needs to find a message that reproduces the unencrypted hash code, since the encryption of two identical hash codes produces the same result.

As a result, the receiver is unable to tell that an attacker has modified the message because the modified message has the same hash code as the original message, and thus the same encrypted hash code.

Strong Collision-Resistant Property

The strong collision-resistant property states that it should be computationally infeasible to find two different inputs m1m2m1 \neq m2, such that H(m1)=H(m2)H(m1) = H(m2).

The strong collision-resistant property implies the weak collision-resistant property; that is, while the latter only requires that a hash function is collision-resistant regarding a specific input message, the former requires collision resistance for any pair of given messages. Thus, a hash function cannot meet the strong collision-resistant property without also satisfying the weak collision-resistant property.

Suppose that Bob does some work for Alice, and he wants her to pay him later. He can draft an IOU message and ask Alice to digitally sign it as a way of agreeing to pay it. To sign the IOU, Alice first hashes it and then signs the hash using her private key. Later, Bob can present this IOU message, along with the signature, to Alice or Alice's bank to retrieve the payment.

If the strong collision-resistant property is not present, Bob can find two different messages that have the same hash code: one requesting Alice to pay a small amount XX, and another requesting her to pay a more substantial amount XXXXXX.

Bob can present the IOU for XX to Alice and have Alice sign it. Later, Bob can present the signature with the message for XXXXXX and ask Alice to pay it. Because the two messages have the same hash value, Alice cannot deny that she has signed the message agreeing to pay XXXXXX.

Hash Function Weaknesses

To understand the constraints and potential weaknesses of hash functions, we need to understand two concepts: the pigeonhole principle, and the birthday paradox.

Pigeonhole Principle

Imagine we have nine pigeonholes. If we have nine pigeons, then we can place each pigeon in one hole. Generally, for nn pigeons and mm holes, each pigeon can occupy an unoccupied hole when m=nm = n.

If we add another pigeon, then there must be one hole occupied by two pigeons. Generally, if n>mn > m, then at least one hole must have more than one pigeon.

Birthday Paradox

How many people do you need in a room before you have a greater than 50% chance that two of them have the same birthday?

There are 365 birthdays, and we can think of these birthdays as pigeonholes. Then, the probability that two people in the room have the same birthday is the probability that two people occupy one pigeonhole.

Obviously, with 366 people, there is a 100% chance that two people have the same birthday.

If we only want a good chance, say 50%, that two people share a birthday, how do we calculate how many people we need in the room?

We can reframe the problem to ask instead: how many people do we need in a room before the probability pp that everyone has a unique birthday drops below 50%?

When we place the first person ff in the room, p=1p = 1. Since there are no other people in the room, ff is guaranteed to have a unique birthday.

When we place the second person ss in the room, there are only 364 unique days left, since ff has already taken one day. The probability that ss doesn't share ff's birthday is 364/365364 / 365, and thus the overall probability pp drops from 1 to 364/365364 / 365.

The third person, tt, is in a similar situation. Since two people precede them, there are only 363 available birthdays left. As a result, pp drops to 364/365363/365364 / 365 * 363 / 365. We multiply the probabilities because we need to make sure that ss doesn't violate the uniqueness constraint and tt doesn't either. Technically, this is a conditional probability.

Generally, for kk possible birthdays and nn individuals in the room, we can calculate the pp as:

p = (1 / k)^n * (k! / (k - n)!)

We can steadily increase nn to determine when pp dips below 0.5. For k=365k = 365 and n=23n = 23, we see that:

p = (1 / 365)^23 * (365! / (365 - 23)!) = 0.492703

Since pp is the probability that no birthdays overlap, the probability that one or more birthdays overlap is 1p=0.5072971 - p = 0.507297.

Analytically, the probability of repetition given kk possible events and nn selected events, is approximately n2/2kn^2/2k. This probability is 0.5 when n=kn = \sqrt{k}. For example, if k=365k = 365, then k=19\sqrt{k} = 19 approximately, which is close to the correct answer of 23.

Back to Hash Functions

Once we understand the pigeonhole principle and the birthday paradox, we see that some of the properties of hash functions seem to contradict each other.

Remember, a hash function produces a fixed-size output from an input of arbitrary size. Since there are an infinite number of arbitrarily-sized inputs, and a finite number of fixed-size hash codes, many inputs can be mapped to the same output hash value. In other words, we have many more pigeons than pigeonholes.

This setup seems to violate the property of collision resistance. However, the collision resistance properties only speak to computational infeasibility, not mathematical impossibility. From a security perspective, a collision that is infeasible to find is as good as one that doesn't exist.

The larger the number of output hash values, the harder it is to find a collision. We can reduce the probability of a collision by increasing the length of the hash code.

Determining Hash Length

To reduce the chance of collision, we need to use hash functions that produce longer hash values, but how many bits is enough?

Suppose a hash function produces hash codes that are ll bits long. As a result, this function can produce 2l2^l possible hash values. According to the birthday paradox, we have a 50% chance of finding a collision after processing 2l=2l/2\sqrt{2^l} = 2^{l/2} messages.

Therefore, if l=64l = 64, then there are 2642^{64} hash values, and an attacker only needs to search 2322^{32} messages to find a collision. This search is entirely feasible with modern computing power. In practice, hash values are at least 128 bits long.

Hash Size Quiz

Hash Size Quiz Solution

Given a hash length nn, an attacker needs to hash 2n/22^{n / 2} messages to find a collision. For n=128n = 128, an attacker needs to compute 2642^{64} hashes.

Secure Hash Algorithm

The original secure hash algorithm is SHA-1, which produces a hash value of 160 bits. The subsequent SHA-2 family of algorithms, which operate similarly to SHA-1, produce hashes of 256-, 384-, and 512-bits long.

The following table compares the SHA parameters.

Message digest size refers to the length of the hash value. As we know, SHA-1 produces 160-bit hashes, and SHA-512 produces 512-bit hashes.

Message size is the size limit on the input. These limits do not have any effect in practice, because most, if not all, messages are much smaller. For example, SHA-1 caps the message size at 2^64 bits. Given that one terabyte is 2^43, SHA-1 can hash a message that is over two million terabytes long.

As we move from left to right in the table, each subsequent algorithm produces a hash value with more bits. Consequently, each subsequent hash function is more secure than the last. For example, with a hash value size of 160 bits, the search space for an attacker to find a collision with SHA-1 is 2^80 messages. For SHA-512, that search space grows to 2^256 messages.

Message Processing

The following figure shows the overall processing of a message to produce a hash value.

Before any processing can start, we must pad the message to a multiple of 1024 because the hash function processes the message in 1024-bit blocks. First, we store the length of the original message in the final 128 bits of the last block. Next, we fill in the space between the end of the original message and the last 128 bits with 1 followed by as many 0s as necessary.

After padding, the message is processed one 1024-bit block at a time. The output of processing the current block becomes the input to processing the next block. That is, when processing the second block, the input includes not only the second message block but also the output of the processing of the first message block.

For the first message block, the input includes an initialization vector (IV), a 512-bit value hardcoded in the algorithm.

The following figure shows the processing of a single message block.

Processing a single block involves 80 rounds of operations that operate on both the current message block mm and the output of processing the previous block.

The inputs to each round include the result from the previous round, some constant kk, and some words ww derived from mm. kk provides randomized values to eliminate any regularities in mm.

The operations at each round include circular shifts and primitive boolean functions based on AND, OR, NOT, and XOR.

The result of processing the current block becomes input for processing the next block, and the result of processing the final block is the hash code for the entire message.

Hash Based Message Authentication

Using hash values for message authentication has several advantages. For example, hash functions are very efficient to compute, and libraries for hash functions are widely available. On the other hand, a hash function such as SHA cannot be used directly for message authentication because it does not rely on a secret.

There have been several proposals to incorporate a secret key into an existing hash function. HMAC has received the most support thus far and has been adopted for use in other protocols such as IPSec and TLS.

The following diagram illustrates how HMAC works.

HMAC involves a hash function HH and a secret key kk. The message mm consists of multiple blocks of bb bits. For example, in SHA-512, each block is 1024 bits, so b=1024b = 1024.

First, kk is padded to bb bits, which is accomplished by appending zeroes to kk. The padded key is then XORed with ipadipad, a constant designed to eliminate any regularities in the key.

The result is a bb-bit value s1s1. s1s1 is prepended to mm, and then the combination s1+ms1 + m is hashed using HH to produce an nn-bit hash value. For example, if the hash function is SHA-512, then n=512n = 512.

Next, the nn-bit hash value is padded to bb bits. The padded key is then XORed with opadopad, another constant designed to eliminate regularities in the key. The result is a bb-bit value s0s0.

The padded hash hh is then appended to s0s0, and the entire message s0+hs0 + h is hashed. The nn-bit result is the output of the HMAC procedure.

HMAC Security

The security of HMAC depends on the cryptographic strength of the underlying hash function. For HMAC to be secure, the underlying hash function must satisfy the properties of non-invertibility and collision resistance.

Furthermore, compared with a cryptographic hash function, it is much harder to launch a successful collision attack on HMAC because HMAC uses a secret key.

For example, suppose the attacker obtains the HMAC of message m1m1 and wants to find another message m2m2 such that HMAC(m2)=HMAC(m1)HMAC(m2) = HMAC(m1) .

Without the secret key, there is no way the attacker can compute the correct HMAC value for m2m2. Thus, the attacker can't determine whether m1m1 and m2m2 have collision in HMAC.

In summary, because of the use of the secret key, HMAC is much more secure than a cryptographic hash function alone.

Hash Function Quiz

Hash Function Quiz Solution

OMSCS Notes is made with in NYC by Matt Schlenker.

Copyright © 2019-2020. All rights reserved.

privacy policy