<< стр. 16(всего 29)СОДЕРЖАНИЕ >>

Page 361 of 666
Applied Cryptography: Second Edition - Bruce Schneier

Figure 18.5 MD5 main loop.

There are four nonlinear functions, one used in each operation (a different one for each round).

GY) ((В¬ X) G GZ)
F(X,Y,Z) = (X G
G(X,Y,Z) = (X GZ) В¬ (Y (В¬ Z))
G
H(X,Y,Z) = X Y Z
I(X,Y,Z) = Y (X (В¬ Z))

Gis
G AND,
( is XOR, is OR, and В¬ is NOT.)

These functions are designed so that if the corresponding bits of X, Y, and Z are independent and
unbiased, then each bit of the result will also be independent and unbiased. The function F is the bit-
wise conditional: If X then Y else Z. The function H is the bit-wise parity operator.

If Mj represents the j th sub-block of the message (from 0 to 15), and <<<s represents a left circular
shift of s bits, the four operations are:

FF(a,b,c,d,Mj,s,ti) denotes a = b + ((a + F(b,c,d ) + Mj + ti) <<< s)
GG(a,b,c,d,Mj,s,ti) denotes a = b + ((a + G(b,c,d ) + Mj + ti) <<< s)
HH(a,b,c,d,Mj,s,ti) denotes a = b + ((a + H(b,c,d) + Mj + ti) <<< s)
II(a,b,c,d,Mj,s,ti) denotes a = b + ((a + I(b,c,d ) + Mj + ti) <<< s)

Figure 18.6 One MD5 operation.

The four rounds (64 steps) look like:

Round 1:

Page 362 of 666
Applied Cryptography: Second Edition - Bruce Schneier

FF (a, b, c, d, M0, 7, 0xd76aa478)
FF (d, a, b, c, M1, 12, 0xe8c7b756)
FF (c, d, a, b, M2, 17, 0x242070db)
FF (b, c, d, a, M3, 22, 0xc1bdceee)
FF (a, b, c, d, M4, 7, 0xf57c0faf)
FF (d, a, b, c, M5, 12, 0x4787c62a)
FF (c, d, a, b, M6, 17, 0xa8304613)
FF (b, c, d, a, M7, 22, 0xfd469501)
FF (a, b, c, d, M8, 7, 0x698098d8)
FF (d, a, b, c, M9, 12, 0x8b44f7af)
FF (c, d, a, b, M10, 17, 0xffff5bb1)
FF (b, c, d, a, M11, 22, 0x895cd7be)
FF (a, b, c, d, M12, 7, 0x6b901122)
FF (d, a, b, c, M13, 12, 0xfd987193)
FF (c, d, a, b, M14, 17, 0xa679438e)
FF (b, c, d, a, M15, 22, 0x49b40821)
Round 2:
GG (a, b, c, d, M1, 5, 0xf61e2562)
GG (d, a, b, c, M6, 9, 0xc040b340)
GG (c, d, a, b, M11, 14, 0x265e5a51)
GG (b, c, d, a, M0, 20, 0xe9b6c7aa)
GG (a, b, c, d, M5, 5, 0xd62f105d)
GG (d, a, b, c, M10, 9, 0x02441453)
GG (c, d, a, b, M15, 14, 0xd8a1e681)
GG (b, c, d, a, M4, 20, 0xe7d3fbc8)
GG (a, b, c, d, M9, 5, 0x21e1cde6)
GG (d, a, b, c, M14, 9, 0xc33707d6)
GG (c, d, a, b, M3, 14, 0xf4d50d87)
GG (b, c, d, a, M8, 20, 0x455a14ed)
GG (a, b, c, d, M13, 5, 0xa9e3e905)
GG (d, a, b, c, M2, 9, 0xfcefa3f8)
GG (c, d, a, b, M7, 14, 0x676f02d9)
GG (b, c, d, a, M12, 20, 0x8d2a4c8a)
Round 3:
HH (a, b, c, d, M5, 4, 0xfffa3942)
HH (d, a, b, c, M8, 11, 0x8771f681)
HH (c, d, a, b, M11, 16, 0x6d9d6122)
HH (b, c, d, a, M14, 23, 0xfde5380c)
HH (a, b, c, d, M1, 4, 0xa4beea44)
HH (d, a, b, c, M4, 11, 0x4bdecfa9)
HH (c, d, a, b, M7, 16, 0xf6bb4b60)

Page 363 of 666
Applied Cryptography: Second Edition - Bruce Schneier

HH (b, c, d, a, M10, 23, 0xbebfbc70)
HH (a, b, c, d, M13, 4, 0x289b7ec6)
HH (d, a, b, c, M0, 11, 0xeaa127fa)
HH (c, d, a, b, M3, 16, 0xd4ef3085)
HH (b, c, d, a, M6, 23, 0x04881d05)
HH (a, b, c, d, M9, 4, 0xd9d4d039)
HH (d, a, b, c, M12, 11, 0xe6db99e5)
HH (c, d, a, b, M15, 16, 0x1fa27cf8)
HH (b, c, d, a, M2, 23, 0xc4ac5665)
Round 4:
II (a, b, c, d, M0, 6, 0xf4292244)
II (d, a, b, c, M7, 10, 0x432aff97)
II (c, d, a, b, M14, 15, 0xab9423a7)
II (b, c, d, a, M5, 21, 0xfc93a039)
II (a, b, c, d, M12, 6, 0x655b59c3)
II (d, a, b, c, M3, 10, 0x8f0ccc92)
II (c, d, a, b, M10, 15, 0xffeff47d)
II (b, c, d, a, M1, 21, 0x85845dd1)
II (a, b, c, d, M8, 6, 0x6fa87e4f)
II (d, a, b, c, M15, 10, 0xfe2ce6e0)
II (c, d, a, b, M6, 15, 0xa3014314)
II (b, c, d, a, M13, 21, 0x4e0811a1)
II (a, b, c, d, M4, 6, 0xf7537e82)
II (d, a, b, c, M11, 10, 0xbd3af235)
II (c, d, a, b, M2, 15, 0x2ad7d2bb)
II (b, c, d, a, M9, 21, 0xeb86d391)

Those constants, ti, were chosen as follows:

In step i, ti is the integer part of 232*abs(sin(i)), where i is in radians.

After all of this, a, b, c, and d are added to A, B, C, D, respectively, and the algorithm continues with
the next block of data. The final output is the concatenation of A, B, C, and D.

Security of MD5

Ron Rivest outlined the improvements of MD5 over MD4 :

1. A fourth round has been added.
2. Each step now has a unique additive constant.
3. The function G in round 2 was changed from ((X GY ) (X GZ ) (Y GZ )) to
G G G
GZ GВ¬
((X G ) (Y G Z )) to make G less symmetric.
4. Each step now adds in the result of the previous step. This promotes a faster avalanche
effect.

Page 364 of 666
Applied Cryptography: Second Edition - Bruce Schneier

5. The order in which message sub-blocks are accessed in rounds 2 and 3 is changed, to
make these patterns less alike.
6. The left circular shift amounts in each round have been approximately optimized, to
yield a faster avalanche effect. The four shifts used in each round are different from the ones
used in other rounds.

Tom Berson attempted to use differential cryptanalysis against a single round of MD5 , but his
attack is ineffective against all four rounds. A more successful attack by den Boer and Bosselaers
produces collisions using the compression function in MD5 [203, 1331, 1336]. This does not lend itself
to attacks against MD5 in practical applications, and it does not affect the use of MD5 in Luby-
Rackoff-like encryption algorithms (see Section 14.11). It does mean that one of the basic design
principles of MD5вЂ”to design a collision-resistant compression functionвЂ”has been violated. Although
it is true that вЂњthere seems to be a weakness in the compression function, but it has no practical
impact on the security of the hash functionвЂќ , I am wary of using MD5.

18.6 MD2

MD2 is another 128-bit one-way hash function designed by Ron Rivest [801, 1335]. It, along with
MD5, is used in the PEM protocols (see Section 24.10). The security of MD2 is dependent on a random
permutation of bytes. This permutation is fixed, and depends on the digits of ПЂ. S0, S1, S2,..., S255 is
the permutation. To hash a message M:

(1) Pad the message with i bytes of value i so that the resulting message is a multiple of 16
bytes long.
(2) Append a 16-byte checksum to the message.
(3) Initialize a 48-byte block: X0, X1, X2,..., X47. Set the first 16 bytes of X to be 0, the
second 16 bytes of X to be the first 16 bytes of the message, and the third 16 bytes of X to be the
XOR of the first 16 bytes of X and the second 16 bytes of X.
(4) This is the compression function:
t=0
For j = 0 to 17
For k = 0 to 47
t = Xk XOR St
Xk = t
t = (t + j ) mod 256
(5) Set the second 16 bytes of X to be the second 16 bytes of the message, and the third 16
bytes of X to be the XOR of the first 16 bytes of X and the second 16 bytes of X. Do step (4).
Repeat steps (5) and (4) with every 16 bytes of the message, in turn.
(6) The output is the first 16 bytes of X.

Although no weaknesses in MD2 have been found (see ), it is slower than most other suggested
hash functions.

18.7 Secure Hash Algorithm (SHA)

NIST, along with the NSA, designed the Secure Hash Algorithm (SHA) for use with the Digital
Signature Standard (see Section 20.2) . (The standard is the Secure Hash Standard (SHS); SHA
is the algorithm used in the standard.) According to the Federal Register :

A Federal Information Processing Standard (FIPS) for Secure Hash Standard (SHS) is

Page 365 of 666
Applied Cryptography: Second Edition - Bruce Schneier

being proposed. This proposed standard specified a Secure Hash Algorithm (SHA) for use
with the proposed Digital Signature Standard .... Additionally, for applications not
requiring a digital signature, the SHA is to be used whenever a secure hash algorithm is
required for Federal applications.

And

This Standard specifies a Secure Hash Algorithm (SHA), which is necessary to ensure the
security of the Digital Signature Algorithm (DSA). When a message of any length < 264
bits is input, the SHA produces a 160-bit output called a message digest. The message
digest is then input to the DSA, which computes the signature for the message. Signing the
message digest rather than the message often improves the efficiency of the process,
because the message digest is usually much smaller than the message. The same message
digest should be obtained by the verifier of the signature when the received version of the
message is used as input to SHA. The SHA is called secure because it is designed to be
computationally infeasible to recover a message corresponding to a given message digest,
or to find two different messages which produce the same message digest. Any change to a
message in transit will, with a very high probability, result in a different message digest,
and the signature will fail to verify. The SHA is based on principles similar to those used
by Professor Ronald L. Rivest of MIT when designing the MD4 message digest algorithm
, and is closely modelled after that algorithm.

SHA produces a 160-bit hash, longer than MD5.

Description of SHA

First, the message is padded to make it a multiple of 512 bits long. Padding is exactly the same as in
MD5: First append a one, then as many zeros as necessary to make it 64 bits short of a multiple of
512, and finally a 64-bit representation of the length of the message before padding.

Five 32-bit variables (MD5 has four variables, but this algorithm needs to produce a 160-bit hash) are
initialized as follows:

A = 0x67452301
B = 0xefcdab89
D = 0x10325476
E = 0xc3d2e1f0

The main loop of the algorithm then begins. It processes the message 512 bits at a time and continues
for as many 512-bit blocks as are in the message.

First the five variables are copied into different variables: a gets A, b gets B, c gets C, d gets D, and e
gets E.

The main loop has four rounds of 20 operations each (MD5 has four rounds of 16 operations each).
Each operation performs a nonlinear function on three of a, b, c, d, and e, and then does shifting and

SHAвЂ™s set of nonlinear functions is:

GY) GZ),
G G for t = 0 to 19.
ft(X,Y,Z ) = (X ((В¬ X )

Page 366 of 666
Applied Cryptography: Second Edition - Bruce Schneier

ft (X,Y,Z ) = X Y Z, for t = 20 to 39.
GY GZ) (Y G for t = 40 to 59.
GZ),
G ) (X G
ft (X,Y,Z ) = (X
ft (X,Y,Z ) = X Y Z, for t = 60 to 79.

Four constants are used in the algorithm:

Kt = 0x5a827999, for t = 0 to 19.
Kt = 0x6ed9eba1, for t = 20 to 39.
Kt = 0x8f1bbcdc, for t = 40 to 59.
Kt = 0xca62c1d6, for t = 60 to 79.

(If you wonder where those numbers came from: 0x5a827999 = 21/2 /4, 0x6ed9eba1 = 31/2 /4,
0x8f1bbcdc = 51/2 /4, and 0xca62c1d6 = 101/2 /4; all times 232.)

The message block is transformed from 16 32-bit words (M0 to M15 ) to 80 32-bit words (W0 to W79)
using the following algorithm:

Wt = Mt, for t = 0 to 15
Wt = (Wt- 3 Wt - 8 Wt - 14 Wt - 16 ) <<< 1, for t = 16 to 79.

(As an interesting aside, the original SHA specification did not have the left circular shift. The change
вЂњcorrects a technical flaw that made the standard less secure than had been thoughtвЂќ . The NSA
has refused to elaborate on the exact nature of the flaw.)

If t is the operation number (from 0 to 79), Wt represents the t th sub-block of the expanded message,
and <<< s represents a left circular shift of s bits, then the main loop looks like:

FOR t = 0 to 79
TEMP = (a <<< 5) + ft (b,c,d) + e + Wt + Kt
e=d
d=c
c = b <<< 30
b=a
a = TEMP

Page 367 of 666
Applied Cryptography: Second Edition - Bruce Schneier

Figure 18.7 One SHA operation.

Figure 18.7 shows one operation. Shifting the variables accomplishes the same thing as MD5 does by
using different variables in different locations.

After all of this, a, b, c, d, and e are added to A, B, C, D, and E respectively, and the algorithm
continues with the next block of data. The final output is the concatenation of A, B, C, D, and E.

Security of SHA

SHA is very similar to MD4, but has a 160-bit hash value. The main changes are the addition of an
expand transformation and the addition of the previous stepвЂ™s output into the next step for a faster
avalanche effect. Ron Rivest made public the design decisions behind MD5, but SHAвЂ™s designers did
not. Here are RivestвЂ™s MD5 improvements to MD4 and how they compare with SHAвЂ™s:

1. вЂњA fourth round has been added.вЂќ SHA does this, too. However, in SHA the fourth
round uses the same f function as the second round.
2. вЂњEach step now has a unique additive constant.вЂќ SHA keeps the MD4 scheme where it
reuses the constants for each group of 20 rounds.
GY) (X G GZ) (Y G to ((X G
GZ))
3. вЂњThe function G in round 2 was changed from ((X G
GВ¬ GY) (X G GZ)
Z) (Y G (Z))) to make G less symmetric.вЂќ SHA uses the MD4 version: ((X G
GZ)).
(Y G
4. вЂњEach step now adds in the result of the previous step. This promotes a faster
avalanche effect.вЂќ This change has been made in SHA as well. The difference in SHA is that a
fifth variable is added, and not b, c, or d, which is already used in ft. This subtle change makes
the den Boer-Bosselaers attack against MD5 impossible against SHA.
5. вЂњThe order in which message sub-blocks are accessed in rounds 2 and 3 is changed, to
make these patterns less alike.вЂќ SHA is completely different, since it uses a cyclic error-
correcting code.
6. вЂњThe left circular shift amounts in each round have been approximately optimized, to
yield a faster avalanche effect. The four shifts used in each round are different from the ones
used in other rounds.вЂќ SHA uses a constant shift amount in each round. This shift amount is
relatively prime to the word size, as in MD4.

This leads to the following comparison: SHA is MD4 with the addition of an expand transformation,
an extra round, and better avalanche effect; MD5 is MD4 with improved bit hashing, an extra round,
and better avalanche effect.

There are no known cryptographic attacks against SHA. Because it produces a 160-bit hash, it is
more resistant to brute-force attacks (including birthday attacks) than 128-bit hash functions covered
in this chapter.

18.8 RIPE-MD

RIPE-MD was developed for the European CommunityвЂ™s RIPE project  (see Section 25.7). The
algorithm is a variation of MD4, designed to resist known cryptanalytic attacks, and produce a 128-
bit hash value. The rotations and the order of the message words are modified. Additionally, two
instances of the algorithm, differing only in the constants, run in parallel. After each block, the output
of both instances are added to the chaining variables. This seems to make the algorithm highly
resistant to cryptanalysis.

Page 368 of 666
Applied Cryptography: Second Edition - Bruce Schneier

18.9 HAVAL

HAVAL is a variable-length one-way hash function . It is a modification of MD5. HAVAL
processes messages in blocks of 1024 bits, twice those of MD5. It has eight 32-bit chaining variables,
twice those of MD5. It has a variable number of rounds, from three to five (each of which has 16
steps), and it can produce a hash length of 128, 160, 192, 224, or 256 bits.

HAVAL replaces MD5вЂ™s simple nonlinear functions with highly nonlinear 7-variable functions, each
of which satisfies the strict avalanche criterion. Each round uses a single function, but in every step a
different permutation is applied to the inputs. It has a new message order and every step (except those
in the first round) uses a different additive constant. The algorithm also has two rotations.

The core of the algorithm is

TEMP = (f(j,A,B,C,D,E,F,G) <<< 7) + (H <<< 11) + M[i][r (j)] + K(j)
H = G; G = F; F = E; E = D; D = C; C = B; B = A; A = TEMP

The variable number of rounds and variable-length output mean there are 15 versions of this
algorithm. Den BoerвЂ™s and BosselaersвЂ™s attack against MD5  does not apply to HAVAL because
of the rotation of H.

18.10 Other One-Way Hash Functions

MD3 is yet another hash function designed by Ron Rivest. It had several flaws and never really made
it out of the laboratory, although a description was recently published in .

A group of researchers at the University of Waterloo have proposed a one-way hash function based
on iterated exponentiation in GF(2593) . In this scheme, a message is divided into 593-bit blocks;
beginning with the first block, the blocks are successively exponentiated. Each exponent is the result
of the computation with the previous block; the first exponent is given by an IV.

Ivan DamgГҐrd designed a one-way hash function based on the knapsack problem (see Section 19.2)
; it can be broken in about 232 operations [290, 1232, 787].

Steve WolframвЂ™s cellular automata  have been proposed as a basis for one-way hash functions.
An early implementation  is insecure [1052, 404]. Another one-way hash function, Cellhash
[384,404], and an improved version, Subhash [384,402, 405], are based on cellular automata; both are
designed for hardware. Boognish mixes the design principles of Cellhash with those of MD4 [402,
407]. StepRightUp can be implemented as a hash function as well .

Claus Schnorr proposed a one-way hash function based on the discrete Fourier transform, called
FFT-Hash, in the summer of 1991 ; it was broken a few months later by two independent
groups [403, 84]. Schnorr proposed a revised version, called FFT-Hash II (the previous version was
renamed FFT-Hash I) , which was broken a few weeks later . Schnorr has proposed
further modifications [1402, 1403] but, as it stands, the algorithm is much slower than the others in
this chapter. Another hash function, called SL2 , is insecure .

Additional theoretical work on constructing one-way hash functions from one-way functions and one-
way permutations can be found in [412, 1138, 1342].

Page 369 of 666
Applied Cryptography: Second Edition - Bruce Schneier

18.11 One-Way Hash Functions Using Symmetric Block Algorithms

It is possible to use a symmetric block cipher algorithm as a one-way hash function. The idea is that if
the block algorithm is secure, then the one-way hash function will also be secure.

The most obvious method is to encrypt the message with the algorithm in CBC or CFB mode, a fixed
key, and IV; the last ciphertext block is the hash value. These methods are described in various
standards using DES: both modes in , CFB in , CBC in [55, 56, 54]. This just isnвЂ™t good
enough for one-way hash functions, although it will work for a MAC (see Section 18.14) .

A cleverer approach uses the message block as the key, the previous hash value as the input, and the
current hash value as the output.

The actual hash functions proposed are even more complex. The block size is usually the key length,
and the size of the hash value is the block size. Since most block algorithms are 64 bits, several
schemes are designed around a hash that is twice the block size.

Assuming the hash function is correct, the security of the scheme is based on the security of the
underlying block function. There are exceptions, though. Differential cryptanalysis is easier against
block functions in hash functions than against block functions used for encryption: The key is known,
so several tricks can be applied; only one right pair is needed for success; and you can generate as
much chosen plaintext as you want. Some work on these lines is [1263, 858, 1313].

What follows is a summary of the various hash functions that have appeared in the literature [925,
1465, 1262]. Statements about attacks against these schemes assume that the underlying block cipher
is secure; that is, the best attack against them is brute force.

One useful measure for hash functions based on block ciphers is the hash rate, or the number of n-bit
messages blocks, where n is the block size of the algorithm, processed per encryption. The higher the
hash rate, the faster the algorithm. (This measure was given the opposite definition in , but the
definition given here is more intuitive and is more widely used. This can be confusing.)

Schemes Where the Hash Length Equals the Block Size

The general scheme is as follows (see Figure 18.8):

H0 = IH, where IH is a random initial value
Hi = EA(B) C

where A, B, and C can be either Mi, H- 1, (Mi Hi - 1), or a constant (assumed to be 0). H0 is some
random initial value: IH. The message is divided up into block-size chunks, Mi, and processed
individually. And there is some kind of MD-strengthening, perhaps the same padding procedure used
in MD5 and SHA.

Figure 18.8 General hash function where the hash length equals the block size.

Page 370 of 666
Applied Cryptography: Second Edition - Bruce Schneier

Table 18.1
Secure Hash Functions Where the Block Length
Equals the Hash Size
Hi = EHi- 1 (Mi) Mi
Hi = EHi - 1(Mi Hi- 1 ) Mi Hi- 1
Hi = EHi- 1(Mi) Hi- 1 Mi
Hi = EHi- 1(Mi Hi- 1) Mi
Hi = EMi(Hi - 1) Hi- 1
Hi = EMi(Mi Hi - 1 ) Mi Hi - 1
Hi = EMi(Hi - 1 ) Mi Hi - 1
Hi = EMi(Mi Hi- 1) Hi- 1
Hi = EMi Hi- 1(Mi) Mi
Hi = EMi Hi- 1(Hi- 1) Hi- 1
Hi = EMi Hi- 1(Mi ) Hi- 1
Hi = EMi Hi- 1(Hi- 1 ) Mi

The three different variables can take on one of four possible values, so there are 64 total schemes of
this type. Bart Preneel studied them all .

Fifteen are trivially weak because the result does not depend on one of the inputs. Thirty-seven are
insecure for more subtle reasons. Table 18.1 lists the 12 secure schemes remaining: The first 4 are
secure against all attacks (see Figure 18.9) and the last 8 are secure against all but a fixed-point
attack, which is not really worth worrying about.

The first scheme was described in . The third scheme was described in [1555, 1105, 1106] and
was proposed as an ISO standard . The fifth scheme was proposed by Carl Meyer, but is
commonly called Davies-Meyer in the literature [1606, 1607, 434, 1028]. The tenth scheme was
proposed as a hash-function mode for LOKI .

The first, second, third, fourth, ninth, and eleventh schemes have a hash rate of 1; the key length
equals the block length. The others have a rate of k/n, where k is the key length. This means that if the
key length is shorter than the block length, then the message block can only be the length of the key. It
is not recommended that the message block be longer than the key length, even if the encryption
algorithmвЂ™s key length is longer than the block length.

If the block algorithm has a DES-like complementation property and DES-like weak keys, there is an
additional attack that is possible against all 12 schemes. The attack isnвЂ™t very dangerous and not
really worth worrying about. However, you can solve it by fixing bits 2 and 3 of the key to вЂњ01вЂќ or
вЂњ10вЂќ [1081, 1107]. Of course, this reduces the length of k from 56 bits to 54 bits (in DES, for example)
and decreases the hash rate.

The following schemes, proposed in the literature, have been shown to be insecure.

Page 371 of 666
Applied Cryptography: Second Edition - Bruce Schneier

Figure 18.9 The four secure hash functions where the block length equals the hash size.

This scheme  was broken in :

Hi = EMi(Hi - 1)

Davies and Price proposed a variant which cycles the entire message through the algorithm twice
[432, 433]. CoppersmithвЂ™s attack works on this variant with not much larger computational
requirements .

Another scheme [432, 458] was shown insecure in :

Hi = EMi (Hi- 1)
Hi- 1

This scheme was shown insecure in  (c is a constant):

Hi = Ec (Mi Hi - 1 ) Mi Hi- 1

Modified Davies-Meyer

Lai and Massey modified the Davies-Meyer technique to work with the IDEA cipher [930, 925]. IDEA
has a 64-bit block size and 128-bit key size. Their scheme is

Ho = IH, where IH is a random initial value
Hi = EHi- 1,Mi(Hi- 1)

This function hashes the message in blocks of 64 bits and produces a 64-bit hash value (See Figure
18.10).

No known attack on this scheme is easier than brute force.

Figure 18.10 Modified Davies-Meyer.

Preneel-Bosselaers-Govaerts-Vandewalle

This hash function, first proposed in , produces a hash value twice the block length of the
encryption algorithm: A 64-bit algorithm produces a 128-bit hash.

Page 372 of 666
Applied Cryptography: Second Edition - Bruce Schneier

With a 64-bit block algorithm, the scheme produces two 64-bit hash values, Gi and Hi, which are
concatenated to produce the 128-bit hash. With most block algorithms, the block size is 64 bits. Two
adjacent message blocks, Li and Ri, each the size of the block length, are hashed together.

G0 = IG, where IG is a random initial value
H0 = IH, where IH is another random initial value
Gi = ELi Hi- 1(Ri Gi- 1 ) Ri Gi- 1 Hi- 1
Hi = ELi Ri(Hi- 1 Gi- 1 ) Li Gi- 1 Hi- 1

Lai demonstrates attacks against this scheme that, in some instances, make the birthday attack
trivially solvable [925, 926]. Preneel  and Coppersmith  also have successful attacks against
this scheme. Do not use it.

Quisquater-Girault

This scheme, first proposed in , generates a hash that is twice the block length and has a hash
rate of 1. It has two hash values, Gi and Hi, and two blocks, Li and Ri, are hashed together.

G0 = IG, where IG is a random initial value
H0 = IH, where IH is another random initial value
Wi = ELi(Gi - 1 Ri) Ri Hi- 1
Gi = ERi(Wi Li) Gi- 1 Hi- 1 Li
H i = Wi Gi- 1

This scheme appeared in a 1989 draft ISO standard , but was dropped in a later version .
Security problems with this scheme were identified in [1107, 925, 1262, 372]. (Actually, the version in
the proceedings was strengthened after the version presented at the conference was attacked.) In some
instances the birthday attack is solvable with a complexity of 239, not 264, through brute force. Do not
use this scheme.

LOKI Double-Block

This algorithm is a modification of Quisquater-Girault, specifically designed to work with LOKI
. All parameters are as in Quisquater-Girault.

G0 = IG, where IG is a random initial value
H0 = IH, where IH is another random initial value
Wi = ELi Gi- 1 (Gi- 1 Ri) Ri Hi- 1
Gi = ERi Hi- 1(Wi Li) Gi- 1 Hi- 1 Li
H i = Wi Gi- 1

Again, in some instances the birthday attack is trivially solvable [925, 926, 1262, 372, 736]. Do not use
this scheme.

Parallel Davies-Meyer

Page 373 of 666
Applied Cryptography: Second Edition - Bruce Schneier

This is yet another attempt at an algorithm with a hash rate of 1 that produces a hash twice the block
length .

G0 = IG, where IG is a random initial value
H0 = IH, where IH is another random initial value
Gi = ELi Ri(Gi- 1 Li) Li Hi- 1
Hi = ELi(Hi - 1 Ri) Ri Hi- 1

Unfortunately, this scheme isnвЂ™t secure either [928, 861]. As it turns out, a double-length hash
function with a hash rate of 1 cannot be more secure than Davies-Meyer .

Tandem and Abreast Davies-Meyer

Another way around the inherent limitations of a block cipher with a 64-bit key uses an algorithm,
like IDEA (see Section 13.9), with a 64-bit block and a 128-bit key. These two schemes produce a 128-
bit hash value and have a hash rate of ВЅ [930, 925].

Figure 18.11 Tandem Davies-Meyer.

In this first scheme, two modified Davies-Meyer functions work in tandem (see Figure 18.11).

G0 = IG, where IG is some random initial value
H0 = IH, where IH is some other random initial value
Wi = EGi- 1, Mi(Hi- 1)
Gi = Gi- 1 EMi,Wi(Gi- 1)
H i = Wi Hi- 1

The following scheme uses two modified Davies-Meyer functions side-by-side (see Figure 18.12).

G0 = IG, where IG is some random initial value
H0 = IH, where IH is some other random initial value
Gi = Gi- 1 EMi,Hi- 1(В¬Gi- 1)
Hi = Hi- 1 EGi- 1,Mi(Hi- 1)

In both schemes, the two 64-bit hash values Gi and Hi are concatenated to produce a single 128-bit
hash.

As far as anyone knows, these algorithms have ideal security for a 128-bit hash function: Finding a
message that hashes to a given hash value requires 2128 attempts, and finding two random messages
that hash to the same value requires 264 attemptsвЂ”assuming that there is no better way to attack the

Page 374 of 666
Applied Cryptography: Second Edition - Bruce Schneier

block algorithm than by using brute force.

MDC-2 and MDC-4

MDC-2 and MDC-4 were first developed at IBM [1081, 1079]. MDC-2, sometimes called Meyer-
Schilling, is under consideration as an ANSI and ISO standard [61, 765]; a variant was proposed in
. MDC-4 is specified for the RIPE project  (see Section 25.7). The specifications use DES as
the block function, although in theory any encryption algorithm could be used.

Figure 18.12 Abreast Davies-Meyer.

Figure 18.13 MDC-2.

MDC-2 has a hash rate of ВЅ, and produces a hash value twice the length of the block size. It is shown
in Figure 18.13. MDC-4 also produces a hash value twice the length of the block size, and has a hash
rate of Вј (see Figure 18.14).

These schemes have been analyzed in [925, 1262]. They are secure against current computing power,
but they are not nearly as secure as the designers have estimated. If the block algorithm is DES, they
have been looked at with respect to differential cryptanalysis .

Both MDC-2 and MDC-4 are patented .

AR Hash Function

The AR hash function was developed by Algorithmic Research, Ltd. and has been distributed by the
ISO for information purposes only . Its basic structure is a variant of the underlying block
cipher (DES in the reference) in CBC mode. The last two ciphertext blocks and a constant are XORed
to the current message block and encrypted by the algorithm. The hash is the last two ciphertext
blocks computed. The message is processed twice, with two different keys, so the hash function has a
hash rate of ВЅ. The first key is 0x0000000000000000, the second key is 0x2a41522f4446502a, and c is
0x0123456789abcdef. The result is compressed to a single 128-bit hash value. See  for the details.

Hi = EK (Mi Hi- 1 Hi- 2 c) Mi

Page 375 of 666
Applied Cryptography: Second Edition - Bruce Schneier

This sounds interesting, but it is insecure. After considerable preprocessing, it is possible to find
collisions for this hash function easily .

Figure 18.14 MDC-4.

GOST Hash Function

This hash function comes from Russia, and is specified in the standard GOST R 34.11-94 . It uses
the GOST block algorithm (see Section 14.1), although in theory it could use any block algorithm with
a 64-bit block size and a 256-bit key. The function produces a 256-bit hash value.

The compression function, Hi = f(Mi,Hi-1) (both operands are 256-bit quantities) is defined as follows:

(1) Generate four GOST encryption keys by some linear mixing of Mi, Hi - 1, and some
constants.
(2) Use each key to encrypt a different 64 bits of Hi- 1 in ECB mode. Store the resulting
256 bits into a temporary variable, S.
(3) Hi is a complex, although linear, function of S, Mi, and Hi- 1.

The final hash of M is not the hash of the last block. There are actually three chaining variables: Hn is
the hash of the last message block, Z is the sum mod 2256 of all the message blocks, and L is the length
of the message. Given those variables and the padded last block, M', the final hash value is:

H = f(Z M', f(L, f(MвЂ™,Hn)))

The documentation is a bit confusing (and in Russian), but I think all that is correct. In any case, this
hash function is specified for use with the Russian Digital Signature Standard (see Section 20.3).

Other Schemes

Ralph Merkle proposed a scheme using DES, but itвЂ™s slow; it only processes seven message bits per
iteration and each iteration involves two DES encryptions [1065, 1069]. Another scheme [1642, 1645]
is insecure ; it was once proposed as an ISO standard.

18.12 Using Public-Key Algorithms

It is possible to use a public-key encryption algorithm in a block chaining mode as a one-way hash
function. If you then throw away the private key, breaking the hash would be as difficult as reading

Page 376 of 666
Applied Cryptography: Second Edition - Bruce Schneier

the message without the private key.

HereвЂ™s an example using RSA. If M is the message to be hashed, n is the product of two primes p and
q, and e is another large number relatively prime to (p - 1)(q - 1), then the hash function, H(M ), would
be

H(M ) = Me mod n

An even easier solution would be to use a single strong prime as the modulus p. Then:

H(M ) = Me mod p

Breaking this problem is probably as difficult as finding the discrete logarithm of e. The problem with
this algorithm is that itвЂ™s far slower than any others discussed here. I donвЂ™t recommend it for that
reason.

18.13 Choosing a One-Way Hash Function

The contenders seem to be SHA, MD5, and constructions based on block ciphers; the others really
havenвЂ™t been studied enough to be in the running. I vote for SHA. It has a longer hash value than
MD5, is faster than the various block-cipher constructions, and was developed by the NSA. I trust the
NSAвЂ™s abilities at cryptanalysis, even if they donвЂ™t make their results public.

Table 18.2 gives timing measurements for some hash functions.y They are meant for comparison
purposes only.

18.14 Message Authentication Codes

A message authentication code, or MAC, is a key-dependent one-way hash function. MACs have the
same properties as the one-way hash functions discussed previously, but they also include a key. Only
someone with the identical key can verify the hash. They are very useful to provide authenticity
without secrecy.

MACs can be used to authenticate files between users. They can also be used by a single user to
determine if his files have been altered, perhaps by a virus. A user could compute the MAC of his files
and store that value in a table. If the user used instead a one-way hash function, then the virus could
compute the new hash value after infection and replace the table entry. A virus could not do that with
a MAC, because the virus does not know the key.

Table 18.2
Speeds of Some Hash Functions on a 33 MHz 486SX
Algorithm Hash Length Encryption Speed (kilobytes/second)
Abreast Davies-Meyer (with IDEA) 128 22
Davies-Meyer (with DES) 64 9
GOST Hash 256 11
HAVAL (3 passes) variable 168
HAVAL (4 passes) variable 118
HAVAL (5 passes) variable 95
MD2 128 23

Page 377 of 666
Applied Cryptography: Second Edition - Bruce Schneier

MD4 128 236
MD5 128 174
N-HASH (12 rounds) 128 29
N-HASH (15 rounds) 128 24
RIPE-MD 128 182
SHA 160 75
SNEFRU (4 passes) 128 48
SNEFRU (8 passes) 128 23

An easy way to turn a one-way hash function into a MAC is to encrypt the hash value with a
symmetric algorithm. Any MAC can be turned into a one-way hash function by making the key
public.

CBC-MAC

The simplest way to make a key-dependent one-way hash function is to encrypt a message with a
block algorithm in CBC or CFB modes. The hash is the last encrypted block, encrypted once more in
CBC or CFB modes. The CBC method is specified in ANSI X9.9 , ANSI X9.19 , ISO 8731-1
, ISO 9797 , and an Australian standard . Differential cryptanalysis can break this
scheme with reduced-round DES or FEAL as the underlying block algorithms .

The potential security problem with this method is that the receiver must have the key, and that key
allows him to generate messages with the same hash value as a given message by decrypting in the
reverse direction.

Message Authenticator Algorithm (MAA)

This algorithm is an ISO standard . It produces a 32-bit hash, and was designed for mainframe
computers with a fast multiply instruction .

v = v <<< 1
e=v w
x = ((((e + y ) mod 232) Mi)) mod 232 - 1
GC)
G * (x
A
y = ((((e + x) mod 232) Mi)) mod 232 - 2
GD)
G * (y
B

Iterate these for each message block, Mi, and the resultant hash is the XOR of x and y. The variables v
and e are determined from the key. A, B, C, and D are constants.

This algorithm is probably in wide use, but I canвЂ™t believe it is all that secure. It was designed a long
time ago, and isnвЂ™t very complicated.

Bidirectional MAC

This MAC produces a hash value twice the length of the block algorithm . First, compute the
CBC-MAC of the message. Then, compute the CBC-MAC of the message with the blocks in reverse
order. The bidirectional MAC value is simply the concatenation of the two. Unfortunately, this
construction is insecure .

Page 378 of 666
Applied Cryptography: Second Edition - Bruce Schneier

JuenemanвЂ™s Methods

This MAC is also called a quadratic congruential manipulation detection code (QCMDC) [792, 789].
First, divide the message into m- bit blocks. Then:

H0 = IH, where IH is the secret key
Hi = (Hi- 1 + Mi)2 mod p, where p is a prime less than 2m - 1 and + denotes integer addition

Jueneman suggests n = 16 and p = 231 - 1. In  he also suggests that an additional key be used as
H1, with the actual message starting at H2.

Because of a variety of birthday-type attacks discovered in conjunction with Don Coppersmith,
Jueneman suggested computing the QCMDC four times, using the result of one iteration as the IV for
the next iteration, and then concatenating the results to obtain a 128-bit hash value . This was
further strengthened by doing the four iterations in parallel and cross-linking them [790, 791]. This
scheme was broken by Coppersmith .

Another variant [432, 434] replaced the addition operation with an XOR and used message blocks
significantly smaller than p. H0 was also set, making it a keyless one-way hash function. After this
scheme was attacked , it was strengthened as part of the European Open Shop Information-
TeleTrust project , quoted in CCITT X.509 , and adopted in ISO 10118 [764, 765].
Unfortunately, Coppersmith has broken this scheme as well . There has been some research
using exponents other than 2 , but none of it has been promising.

RIPE-MAC

RIPE-MAC was invented by Bart Preneel  and adopted by the RIPE project  (see Section
18.8). It is based on ISO 9797 , and uses DES as a block encryption function. RIPE-MAC has two
flavors: one using normal DES, called RIPE-MAC1, and another using triple-DES for even greater
security, called RIPE-MAC3. RIPE-MAC1 uses one DES encryption per 64-bit message block; RIPE-
MAC3 uses three.

The algorithm consists of three parts. First, the message is expanded to a length that is a multiple of
64 bits. Next, the expanded message is divided up into 64-bit blocks. A keyed compression function is
used to hash these blocks, under the control of a secret key, into a single block of 64 bits. This is the
step that uses either DES or triple-DES. Finally, the output of this compression is subjected to another
DES-based encryption with a different key, derived from the key used in the compression. See 
for details.

IBC-Hash

IBC-Hash is another MAC adopted by the RIPE project  (see Section 18.8). It is interesting
because it is provably secure; the chance of successful attack can be quantified. Unfortunately, every
message must be hashed with a different key. The chosen level of security puts constraints on the
maximum message size that can be hashedвЂ”something no other function in this chapter does. Given
these considerations, the RIPE report recommends that IBC-Hash be used only for long, infrequently
sent messages.

The heart of the function is

Page 379 of 666
Applied Cryptography: Second Edition - Bruce Schneier

hi = ((Mi mod p) + v ) mod 2n

The secret key is the pair p and v, where p is an N- bit prime and v is a random number less than 2n.
The Mi values are derived by a carefully specified padding procedure. The probabilities of breaking
both the one-wayness and the collision-resistance can be quantified, and users can choose their
security level by changing the parameters.

One-Way Hash Function MAC

A one-way hash function can also be used as a MAC . Assume Alice and Bob share a key K, and
Alice wants to send Bob a MAC for message M. Alice concatenates K and M, and computes the one-
way hash of the concatenation: H (K,M ). This hash is the MAC. Since Bob knows K, he can reproduce
AliceвЂ™s result. Mallory, who does not know K, canвЂ™t.

This method works with MD-strengthening techniques, but has serious problems. Mallory can always
add new blocks to the end of the message and compute a valid MAC. This attack can be thwarted if
you put the message length at the beginning, but Preneel is suspicious of this scheme . It is
better to put the key at the end of the message, H (M,K ), but this has some problems as well . If
H is one-way but not collision-free, Mallory can forge messages. Still better is H (K,M,K ), or H
(K1,M,K2 ), where K1 and K2 are different . Preneel is still suspicious .

The following constructions seem secure:

H (K1,H(K2, M))
H (K, H (K,M))
H (K,p,M,K ), where p pads K to a full message block.

Figure 18.15 Stream cipher MAC.

The best approach is to concatenate at least 64 bits of the key with each message block. This makes
the one-way hash function less efficient, because the message blocks are smaller, but it is much more
secure .

Alternatively, use a one-way hash function and a symmetric algorithm. Hash the file, then encrypt the
hash. This is more secure than first encrypting the file and then hashing the encrypted file, but it is
vulnerable to the same attack as the H (M,K ) approach .

Stream Cipher MAC

This MAC scheme uses stream ciphers (see Figure 18.15) . A cryptographically secure pseudo-
random-bit generator demultiplexes the message stream into two substreams. If the output bit of the
bit generator ki, is 1, then the current message bit mi, is routed to the first substream; if the ki is 0, the
mi is routed to the second substream. The substreams are each fed into a different LFSR (see Section

Page 380 of 666
Applied Cryptography: Second Edition - Bruce Schneier

16.2). The output of the MAC is simply the final states of the shift registers.

Unfortunately, this method is not secure against small changes in the message . For example, if
you alter the last bit of the message, then only 2 bits in the corresponding MAC value need to be
altered to create a fake MAC; this can be done with reasonable probability. The author presents a
more secure, and more complicated, alternative.

Chapter 19
Public-Key Algorithms
19.1 Background

The concept of public-key cryptography was invented by Whitfield Diffie and Martin Hellman, and
independently by Ralph Merkle. Their contribution to cryptography was the notion that keys could
come in pairsвЂ”an encryption key and a decryption keyвЂ”and that it could be infeasible to generate
one key from the other (see Section 2.5). Diffie and Hellman first presented this concept at the 1976
National Computer Conference ; a few months later, their seminal paper вЂњNew Directions in
CryptographyвЂќ was published . (Due to a glacial publishing process, MerkleвЂ™s first contribution
to the field didnвЂ™t appear until 1978 .)

Since 1976, numerous public-key cryptography algorithms have been proposed. Many of these are
insecure. Of those still considered secure, many are impractical. Either they have too large a key or
the ciphertext is much larger than the plaintext.

Only a few algorithms are both secure and practical. These algorithms are generally based on one of
the hard problems discussed in Section 11.2. Of these secure and practical public-key algorithms,
some are only suitable for key distribution. Others are suitable for encryption (and by extension for
key distribution). Still others are only useful for digital signatures. Only three algorithms work well
for both encryption and digital signatures: RSA, ElGamal, and Rabin. All of these algorithms are
slow. They encrypt and decrypt data much more slowly than symmetric algorithms; usually thatвЂ™s too
slow to support bulk data encryption.

Hybrid cryptosystems (see Section 2.5) speed things up: A symmetric algorithm with a random session
key is used to encrypt the message, and a public-key algorithm is used to encrypt the random session
key.

Security of Public-Key Algorithms

Since a cryptanalyst has access to the public key, he can always choose any message to encrypt. This
means that a cryptanalyst, given C = EK(P), can guess the value of P and easily check his guess. This is
a serious problem if the number of possible plaintext messages is small enough to allow exhaustive
search, but can be solved by padding messages with a string of random bits. This makes identical
23.15.)

This is especially important if a public-key algorithm is used to encrypt a session key. Eve can
generate a database of all possible session keys encrypted with BobвЂ™s public key. Sure, this requires a
large amount of time and memory, but for a 40-bit exportable key or a 56-bit DES key, itвЂ™s a whole lot
less time and memory than breaking BobвЂ™s public key. Once Eve has generated the database, she will
have his key and can read his mail at will.

Page 381 of 666
Applied Cryptography: Second Edition - Bruce Schneier

Public-key algorithms are designed to resist chosen-plaintext attacks; their security is based both on
the difficulty of deducing the secret key from the public key and the difficulty of deducing the
plaintext from the ciphertext. However, most public-key algorithms are particularly susceptible to a
chosen-ciphertext attack (see Section 1.1).

In systems where the digital signature operation is the inverse of the encryption operation, this attack
is impossible to prevent unless different keys are used for encryption and signatures.

Consequently, it is important to look at the whole system and not just at the individual parts. Good
public-key protocols are designed so that the various parties canвЂ™t decrypt arbitrary messages
generated by other partiesвЂ”the proof-of-identity protocols are a good example (see Section 5.2).

19.2 Knapsack Algorithms

The first algorithm for generalized public-key encryption was the knapsack algorithm developed by
Ralph Merkle and Martin Hellman [713, 1074]. It could only be used for encryption, although Adi
Shamir later adapted the system for digital signatures . Knapsack algorithms get their security
from the knapsack problem, an NP-complete problem. Although this algorithm was later found to be
insecure, it is worth examining because it demonstrates how an NP-complete problem can be used for
public-key cryptography.

The knapsack problem is a simple one. Given a pile of items, each with different weights, is it possible
to put some of those items into a knapsack so that the knapsack weighs a given amount? More
formally: Given a set of values M1, M2,..., Mn , and a sum S, compute the values of bi such that

S = b1M1 + b2M2 + ...+ bnMn

The values of bi can be either zero or one. A one indicates that the item is in the knapsack; a zero
indicates that it isnвЂ™t.

For example, the items might have weights of 1, 5, 6, 11, 14, and 20. You could pack a knapsack that
weighs 22; use weights 5, 6, and 11. You could not pack a knapsack that weighs 24. In general, the
time required to solve this problem seems to grow exponentially with the number of items in the pile.

The idea behind the Merkle-Hellman knapsack algorithm is to encode a message as a solution to a
series of knapsack problems. A block of plaintext equal in length to the number of items in the pile
would select the items in the knapsack (plaintext bits corresponding to the b values), and the
ciphertext would be the resulting sum. Figure 19.1 shows a plaintext encrypted with a sample
knapsack problem.

The trick is that there are actually two different knapsack problems, one solvable in linear time and
the other believed not to be. The easy knapsack can be modified to create the hard knapsack. The
public key is the hard knapsack, which can easily be used to encrypt but cannot be used to decrypt
messages. The private key is the easy knapsack, which gives an easy way to decrypt messages. People
who donвЂ™t know the private key are forced to try to solve the hard knapsack problem.

Superincreasing Knapsacks

What is the easy knapsack problem? If the list of weights is a superincreasing sequence, then the
resulting knapsack problem is easy to solve. A superincreasing sequence is a sequence in which every

Page 382 of 666
Applied Cryptography: Second Edition - Bruce Schneier

term is greater than the sum of all the previous terms. For example, {1, 3, 6, 13, 27, 52} is a
superincreasing sequence, but {1, 3, 4, 9, 15, 25} is not.

The solution to a superincreasing knapsack is easy to find. Take the total weight and compare it with
the largest number in the sequence. If the total weight is less than the number, then it is not in the
knapsack. If the total weight is greater than or equal to the number, then it is in the knapsack. Reduce
the weight of the knapsack by the value and move to the next largest number in the sequence. Repeat
until finished. If the total weight has been brought to zero, then there is a solution. If the total weight
has not, there isnвЂ™t.

For example, consider a total knapsack weight of 70 and a sequence of weights of {2, 3, 6, 13, 27, 52}.
The largest weight, 52, is less than 70, so 52 is in the knapsack. Subtracting 52 from 70 leaves 18. The
next weight, 27, is greater than 18, so 27 is not in the knapsack. The next weight, 13, is less than 18, so
13 is in the knapsack. Subtracting 13 from 18 leaves 5. The next weight, 6, is greater than 5, so 6 is not
in the knapsack. Continuing this process will show that both 2 and 3 are in the knapsack and the total
weight is brought to 0, which indicates that a solution has been found. Were this a Merkle-Hellman
knapsack encryption block, the plaintext that resulted from a ciphertext value of 70 would be 110101.

Non-superincreasing, or normal, knapsacks are hard problems; they have no known quick algorithm.
The only known way to determine which items are in the knapsack is to methodically test possible
solutions until you stumble on the correct one. The fastest algorithms, taking into account the various
heuristics, grow exponentially with the number of possible weights in the knapsack. Add one item to
the sequence of weights, and it takes twice as long to find the solution. This is much more difficult
than a superincreasing knapsack where, if you add one more weight to the sequence, it simply takes
another operation to find the solution.

Figure 19.1 Encryption with knapsacks.

The Merkle-Hellman algorithm is based on this property. The private key is a sequence of weights for
a superincreasing knapsack problem. The public key is a sequence of weights for a normal knapsack
problem with the same solution. Merkle and Hellman developed a technique for converting a
superincreasing knapsack problem into a normal knapsack problem. They did this using modular
arithmetic.

Creating the Public Key from the Private Key

Without going into the number theory, this is how the algorithm works: To get a normal knapsack
sequence, take a superincreasing knapsack sequence, for example {2, 3, 6, 13, 27, 52}, and multiply all
of the values by a number n, mod m. The modulus should be a number greater than the sum of all the
numbers in the sequence: for example, 105. The multiplier should have no factors in common with the
modulus: for example, 31. The normal knapsack sequence would then be

2 * 31 mod 105 = 62
3 * 31 mod 105 = 93
6 * 31 mod 105 = 81
13 * 31 mod 105 = 88
27 * 31 mod 105 = 102
52 * 31 mod 105 = 37

Page 383 of 666
Applied Cryptography: Second Edition - Bruce Schneier

The knapsack would then be {62, 93, 81, 88, 102, 37}.

The superincreasing knapsack sequence is the private key. The normal knapsack sequence is the
public key.

Encryption

To encrypt a binary message, first break it up into blocks equal to the number of items in the
knapsack sequence. Then, allowing a one to indicate the item is present and a zero to indicate that the
item is absent, compute the total weights of the knapsacksвЂ”one for every message block.

For example, if the message were 011000110101101110 in binary, encryption using the previous
knapsack would proceed like this:

message = 011000 110101 101110
011000 corresponds to 93 + 81 = 174
110101 corresponds to 62 + 93 + 88 + 37 = 280
101110 corresponds to 62 + 81 + 88 + 102 = 333

The ciphertext would be

174,280,333

Decryption

A legitimate recipient of this message knows the private key: the original superincreasing knapsack,
as well as the values of n and m used to transform it into a normal knapsack. To decrypt the message,
the recipient must first determine n-1 such that n(n-1 ) G (mod m). Multiply each of the ciphertext
G1
values by n-1 mod m, and then partition with the private knapsack to get the plaintext values.

In our example, the superincreasing knapsack is {2, 3, 6, 13, 27, 52}, m is equal to 105, and n is equal
to 31. The ciphertext message is 174, 280, 333. In this case n-1 is equal to 61, so the ciphertext values
must be multiplied by 61 mod 105.

174 * 61 mod 105 = 9 = 3 + 6, which corresponds to 011000
280 * 61 mod 105 = 70 = 2 + 3 + 13 + 52, which corresponds to 110101
333 * 61 mod 105 = 48 = 2 + 6 + 13 + 27, which corresponds to 101110

The recovered plaintext is 011000 110101 101110.

Practical Implementations

With a knapsack sequence of only six items, itвЂ™s not hard to solve the problem even if it isnвЂ™t
superincreasing. Real knapsacks should contain at least 250 items. The value for each term in the
superincreasing knapsack should be somewhere between 200 and 400 bits long, and the modulus
should be somewhere between 100 to 200 bits long. Real implementations of the algorithm use
random-sequence generators to produce these values.

With knapsacks like that, itвЂ™s futile to try to solve them by brute force. If a computer could try a
million possibilities per second, trying all possible knapsack values would take over 10 46 years. Even a

Page 384 of 666
Applied Cryptography: Second Edition - Bruce Schneier

million machines working in parallel wouldnвЂ™t solve this problem before the sun went nova.

Security of Knapsacks

It wasnвЂ™t a million machines that broke the knapsack cryptosystem, but a pair of cryptographers.
First a single bit of plaintext was recovered . Then, Shamir showed that knapsacks can be
broken in certain circumstances [1415, 1416]. There were other resultsвЂ”[1428, 38, 754, 516, 488]вЂ”
but no one could break the general Merkle-Hellman system. Finally, Shamir and Zippel [1418, 1419,
1421] found flaws in the transformation that allowed them to reconstruct the superincreasing
knapsack from the normal knapsack. The exact arguments are beyond the scope of this book, but a
nice summary of them can be found in [1233, 1244]. At the conference where the results were
presented, the attack was demonstrated on stage using an Apple II computer [492, 494].

Knapsack Variants

Since the original Merkle-Hellman scheme was broken, many other knapsack systems have been
proposed: multiple iterated knapsacks, Graham-Shamir knapsacks, and others. These have all been
analyzed and broken, generally using the same cryptographic techniques, and litter the cryptographic
highway [260, 253, 269, 921, 15, 919, 920, 922, 366, 254, 263, 255]. Good overviews of these systems
and their cryptanalyses can be found in [267, 479, 257, 268].

Other algorithms have been proposed that use ideas similar to those used in knapsack cryptosystems,
but these too have been broken. The Lu-Lee cryptosystem [990, 13] was broken in [20, 614, 873]; a
modification  is also insecure . Attacks on the Goodman-McAuley cryptosystem are in
[646, 647, 267, 268]. The Pieprzyk cryptosystem  can be broken by similar attacks. The Niemi
cryptosystem , based on modular knapsacks, was broken in [345, 788]. A newer multistage
knapsack  has not yet been broken, but I am not optimistic. Another variant is .

While a variation of the knapsack algorithm is currently secureвЂ”the Chor-Rivest knapsack ,
despite a вЂњspecialized attackвЂќ вЂ”the amount of computation required makes it far less useful
than the other algorithms discussed here. A variant, called the Powerline System, is not secure .
Most important, considering the ease with which all the other variations fell, it doesnвЂ™t seem prudent
to trust them.

Patents

The original Merkle-Hellman algorithm is patented in the United States  and worldwide (see
Table 19.1). Public Key Partners (PKP) licenses the patent, along with other public-key cryptography
patents (see Section 25.5). The U.S. patent will expire on August 19, 1997.

19.3 RSA

Soon after MerkleвЂ™s knapsack algorithm came the first full-fledged public-key algorithm, one that
works for encryption and digital signatures: RSA [1328, 1329]. Of all the public-key algorithms
proposed over the years, RSA is by far the easiest to understand and implement. (Martin Gardner
published an early description of the algorithm in his вЂњMathematical GamesвЂќ column in Scientific
American .) It is also the most popular. Named after the three inventorsвЂ”Ron Rivest, Adi
Shamir, and Leonard AdlemanвЂ”it has since withstood years of extensive cryptanalysis. Although the
cryptanalysis neither proved nor disproved RSAвЂ™s security, it does suggest a confidence level in the
algorithm.

Page 385 of 666
Applied Cryptography: Second Edition - Bruce Schneier

Table 19.1
Foreign Merkle-Hellman Knapsack Patents
Country Number Date of Issue
Belgium 871039 5 Apr 1979
Netherlands 7810063 10 Apr 1979
Great Britain 2006580 2 May 1979
Germany 2843583 10 May 1979
Sweden 7810478 14 May 1979
France 2405532 8 Jun 1979
Germany 2843583 3 Jun 1982
Germany 2857905 15 Jul 1982
Great Britain 2006580 18 Aug 1982
Switzerland 63416114 14 Jan 1983
Italy 1099780 28 Sep 1985

RSA gets its security from the difficulty of factoring large numbers. The public and private keys are
functions of a pair of large (100 to 200 digits or even larger) prime numbers. Recovering the plaintext
from the public key and the ciphertext is conjectured to be equivalent to factoring the product of the
two primes.

To generate the two keys, choose two random large prime numbers, p and q. For maximum security,
choose p and q of equal length. Compute the product:

n = pq

Then randomly choose the encryption key, e, such that e and (p - 1)(q - 1) are relatively prime. Finally,
use the extended Euclidean algorithm to compute the decryption key, d, such that

G1
G mod (p - 1)(q - 1)
ed

In other words,

d = e-1 mod ((p - 1)(q - 1))

Note that d and n are also relatively prime. The numbers e and n are the public key; the number d is
the private key. The two primes, p and q, are no longer needed. They should be discarded, but never
revealed.

To encrypt a message m, first divide it into numerical blocks smaller than n (with binary data, choose
the largest power of 2 less than n). That is, if both p and q are 100-digit primes, then n will have just
under 200 digits and each message block, mi , should be just under 200 digits long. (If you need to
encrypt a fixed number of blocks, you can pad them with a few zeros on the left to ensure that they
will always be less than n.) The encrypted message, c, will be made up of similarly sized message
blocks, ci, of about the same length. The encryption formula is simply
 << стр. 16(всего 29)СОДЕРЖАНИЕ >>