Kompetisi Fungsi Hash NIST (SHA-3)

Slides:



Advertisements
Presentasi serupa
INTRO (TO BPOS). What is BPOS? Apakah BPOS itu? •BPOS = (Microsoft) Business Productivity Online Suite (Service) •adalah sebuah layanan online Microsoft,
Advertisements

Pengujian Hipotesis untuk Satu dan Dua Varians Populasi
Mata Kuliah : ALGORITMA dan STRUKTUR DATA 1.
PEMOGRAMAN BERBASIS JARINGAN
Hadi Syahrial (Health IT Security Forum)
TRIP GENERATION.
Program Keahlian I – SI By Antonius Rachmat C, S.Kom
Materi Analisa Perancangan System.
Peta Kontrol (Untuk Data Variabel)
Statistika Nonparametrik PERTEMUAN KE-1 FITRI CATUR LESTARI, M. Si
1 Pertemuan > Desain fisik basis data Matakuliah: >/ > Tahun: > Versi: >
Process to Process Delivery
IT Project Management Based on PMBOK
PERULANGANPERULANGAN. 2 Flow of Control Flow of Control refers to the order that the computer processes the statements in a program. –Sequentially; baris.
REVIEW.
Slide 3-1 Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Revised by IB & SAM, Fasilkom UI, 2005 Exercises Apa saja komponen utama.
Introduction to The Design & Analysis of Algorithms
IF-ITB/SAS/25Aug2003 IF7074 – Bagian Pertama Page 1 IF 7047 Kewirausahaan Teknologi Informasi Bagian Pertama: 1.1. Entrepreneurship, entrepreneur, dan.
Ilmu Komputer, FMIPA UGM
PROSES PADA WINDOWS Pratikum SO. Introduksi Proses 1.Program yang sedang dalam keadaan dieksekusi. 2.Unit kerja terkecil yang secara individu memiliki.
Bagian Hukum Internasional
1. Objek dalam kalimat aktif menjadi subjek dalam kalimat pasif
M. Suwarso Kegiatan Lembaga Standarisasi Internasional Dalam Hal Telepon Internet Telepon Internet.
Review Operasi Matriks
Jeff Howbert Introduction to Machine Learning Winter Classification Nearest Neighbor.
Internal dan Eksternal Sorting
Could not load an object because it is not avaliable on this machine. Tidak dapat memuat sebuah benda karena tidak tersedia pada mesin ini.
IT ASSESSMENTS Susanto Halim( ) Nobel Handika( ) Peby Sanjaya( ) M. Royfayusyar() Armagedon()
Risk Management.
Text 1 By: Siwi Ratri K / Titik Rahayu /
2-Metode Penelitian Dalam Psikologi Klinis
Implementing an REA Model in a Relational Database
MEMORY Bhakti Yudho Suprapto,MT. berfungsi untuk memuat program dan juga sebagai tempat untuk menampung hasil proses bersifat volatile yang berarti bahwa.
2nd MEETING Assignment 4A “Exploring Grids” Assignment 4 B “Redesign Grids” Create several alternatives grid sysytem using the provided elements: (min.
Project 4: Influence of the Block Size for Different Cache Sizes Oleh : Mohd Aziz Shah Bin Mohd Basir.
Features Full Duplex Operation (Independent Serial Receive and Transmit Registers) Asynchronous or Synchronous Operation Master or Slave Clocked Synchronous.
Kreativitas Kreativitas Kreativitas Kreativitas Kreativitas Kreativitas Kreativitas Kreativitas Kreativitas Kreativitas Kreativitas Kreativitas Kreativitas.
LOGO Manajemen Data Berdasarkan Komputer dengan Sistem Database.
Organizing for Innovation Ch 13. Focus this chapter on: The methods by which firms organize for innovation.
Linked List dan Double Linked List
We are in search of passionate and driven individual to become one of the few Management Associates who will be developed to become bright leaders in the.
Definisi VLAN Pemisahan jaringan secara logis yang dilakukan pada switch Pada tradisional switch, dalam satu switch menunjukkan satu segmentasi LAN.
MODELS OF PR SYIFA SA. Grunig's Four models of Public Relations Model Name Type of Communica tion Model Characteristics Press agentry/ publicity model.
Metodologi Penelitian dalam Bidang Informatika
BASH – Shell Programming Guide Erick, Joan © Sekolah Tinggi Teknik Surabaya 1.
Diagnose device problems that connected to the Wide Area Network Identify problems Through the Symptoms that arise HOME.
SMPN 2 DEMAK GRADE 7 SEMESTER 2
THE IMMERSED TUNNELS MAIN BENEFITS AND INNOVATION BY. WAWAN SETIAWAN.
STRUCTURAL CONTROL continuation STATEMENT  SWITCH  WHILE  DO..WHILE.
THE EFFICIENT MARKETS HYPOTHESIS AND CAPITAL ASSET PRICING MODEL
Situasi Terkini tentang Penelitian dan Pelaksanaan Test danTreat di 28 Oktober 2014 Lecture Series Pusat Penelitian HIV dan AIDS.
1. 2 Work is defined to be the product of the magnitude of the displacement times the component of the force parallel to the displacement W = F ║ d F.
© 2009 Fakultas Teknologi Informasi Universitas Budi Luhur Jl. Ciledug Raya Petukangan Utara Jakarta Selatan Website:
Via Octaria Malau Transfer (Internal Transfers) Transfer (Transfers Internal) Select the account from which funds are to be transferred FROM and then select.
PENJUMLAHAN GAYA TUJUAN PEMBELAJARAN:
The Members: 1. Masayu martika sari 2. Dhea riski 3. Meri puspita sari
Pengujian Perangkat Lunak
The intensive state of a PVT system containing N chemical species and  phases in equilibrium is characterized by the intensive variables, temperature.
PENGANTAR KAJIAN BUDAYA URBAN
ASSALAMU’ALAIKUM Wr.Wb I will be presenting on how to make ice cream (Assalamu'alaikum Wr.Wb Saya akan menyajikan tentang cara untuk membuat es krim) Name:M.
Menu Standard Competence Based Competence.
Retrosintetik dan Strategi Sintesis
Web Teknologi I (MKB511C) Minggu 12 Page 1 MINGGU 12 Web Teknologi I (MKB511C) Pokok Bahasan: – Text processing perl-compatible regular expression/PCRE.
Made by: Febri, Andrew, Erina, Leon, Luvin, Jordy
Slide 1 Chapter 1: Introduction to Systems Analysis and Design Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc.
Lecture 5 Nonblocking I/O and Multiplexing Erick Pranata © Sekolah Tinggi Teknik Surabaya 1.
BLACK BOX TESTING.
Secure Hash Algorithm (SHA)
Bina Nusantara Mata Kuliah: K0194-Pemodelan Matematika Terapan Tahun : 2008 Aplikasi Model Markov Pertemuan 22:
THE INFORMATION ABOUT HEALTH INSURANCE IN AUSTRALIA.
Transcript presentasi:

Kompetisi Fungsi Hash NIST (SHA-3) Bahan Kuliah IF3058 Kriptografi Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB Latar Belakang Seperti sejarah AES, National Institute of Standards and Technology (NIST) menyelenggarakan kompetisi terbuka untuk mengembangkan fungsi hash yang baru, bernama SHA-3 SHA-3 menjadi komplementer SHA-1 dan SHA-2 Kompetisi diumumkan pada tahun 2007 dan berakhir pada Oktober 2012 dengan memilih pemenang. Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB Proses Pemilihan Proses pemilihan terdiri dari 2 putaran dan final Jumlah submission adalah 64 rancangan fungsi hash. Putaran pertama (penyisihan): dipilih 51 submission Putaran kedua (semi final): dipilih 14 submission Babak final: 5 finalis Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB Finalis BLAKE Grøstl JH Keccak Skein Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB BLAKE Designers: Jean-Philippe Aumasson, Luca Henzen, Willi Meier, Raphael C.-W. Phan Detail: Digest sizes 224, 256, 384 or 512 bits Rounds 14 or 16 Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB Grøstl Designers: Praveen Gauravaram, Lars Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, and Søren S. Thomsen Detail: Digest sizes 256 and 512 Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB JH Designers: Hongjun Wu Detail: Digest sizes 224, 256, 384, 512 Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB Keccak Designers: Guido Breton, Joan Daemen, Michaël Peeters and Gilles Van Assche. Detail: Digest sizes arbitrary Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB SKEIN Designers: Bruce Schneier, Stefan Lucks, Niels Ferguson, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas and Jesse Walker. Detail: Digest sizes arbitrary Rounds: 72 (256 & 512 block size), 80 (1024 block size) Rinaldi Munir/Informatika-STEI ITB

dan pemenangnya adalah… Keccak Keccak terpilih sebagai SHA-3 Guido Breton, Joan Daemen, Michaël Peeters and Gilles Van Assche. Rinaldi Munir/Informatika-STEI ITB

Kriteria Penilaian oleh NIST NIST noted some factors that figured into its selection as it announced the finalists:[11] Performance: "A couple of algorithms were wounded or eliminated by very large [hardware gate] area requirement – it seemed that the area they required precluded their use in too much of the potential application space.“ Security: "We preferred to be conservative about security, and in some cases did not select algorithms with exceptional performance, largely because something about them made us 'nervous,' even though we knew of no clear attack against the full algorithm.“ Analysis: "NIST eliminated several algorithms because of the extent of their second-round tweaks or because of a relative lack of reported cryptanalysis – either tended to create the suspicion that the design might not yet be fully tested and mature.“ Diversity: The finalists included hashes based on different modes of operation, including the HAIFA and sponge function constructions, and with different internal structures, including ones based on AES, bitslicing, and alternating XOR with addition. Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB Sekilas Keccak Nama 'Keccak' berasal dari 'Kecak', tarian Bali. Keccak berbeda dari finalis SHA3 lainnya dalam hal menggunakan konstruksi 'spons' (sponge construction). Jika desain lainnya bergantung pada 'fungsi kompresi, Keccak menggunakan fungsi non-kompresi untuk menyerap dan kemudian 'memeras' digest singkat. Ini jelas apakah desain ini lebih baik atau lebih buruk daripada pendekatan yang ada. Tapi itu berbeda. NIST merasa bahwa dalam kasus ini, yang berbeda adalah lebih baik. Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB Konstruksi spons Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB First, the input string is padded with a reversible padding rule and cut into blocks of r bits. Then the b bits of the state are initialized to zero and the sponge construction proceeds in two phases: (a) In the absorbing phase, the r-bit input blocks are XORed into the first r bits of the state, interleaved with applications of the function f. When all input blocks are processed, the sponge construction switches to the squeezing phase. (b) In the squeezing phase, the first r bits of the state are returned as output blocks, interleaved with applications of the function f. The number of output blocks is chosen at will by the user. The last c bits of the state are never directly affected by the input blocks and are never output during the squeezing phase. Sumber: http://sponge.noekeon.org/ Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB Keccak[r,c](M) { Initialization and padding S[x,y] = 0, forall (x,y) in (0…4,0…4) P = M || 0x01 || 0x00 || … || 0x00 P = P xor (0x00 || … || 0x00 || 0x80) Absorbing phase forall block Pi in P S[x,y] = S[x,y] xor Pi[x+5*y], forall (x,y) such that x+5*y < r/w S = Keccak-f[r+c](S) Squeezing phase Z = empty string while output is requested Z = Z || S[x,y], forall (x,y) such that x+5*y < r/w return Z } Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB Keccak-f[b](A) { forall i in 0…nr-1 A = Round[b](A, RC[i]) return A } Round[b](A,RC) { θ step C[x] = A[x,0] xor A[x,1] xor A[x,2] xor A[x,3] xor A[x,4], forall x in 0…4 D[x] = C[x-1] xor rot(C[x+1],1), forall x in 0…4 A[x,y] = A[x,y] xor D[x], forall (x,y) in (0…4,0…4) ρ and π steps B[y,2*x+3*y] = rot(A[x,y], r[x,y]), forall (x,y) in (0…4,0…4) χ step A[x,y] = B[x,y] xor ((not B[x+1,y]) and B[x+2,y]), forall (x,y) in (0…4,0…4) ι step A[0,0] = A[0,0] xor RC Rinaldi Munir/Informatika-STEI ITB

Rinaldi Munir/Informatika-STEI ITB Spesifikasi Keccak (termasuk source code) dapat dilihat di: http://keccak.noekeon.org/specs_summary.html Rinaldi Munir/Informatika-STEI ITB