(sha2 part insertion)
Line 2: Line 2:
 
In today’s world, the average person has 70-80 different passwords across multiple accounts. While users wouldn’t care if their Webkinz password got leaked, bank account details being stolen is much more detrimental to users. In order to keep them safe, banks are required by the FTC to have proper security to keep users passwords safe. The common algorithm used is hashing. Technically speaking, hashing is a method of making a finite string of characters into a fixed size. Early hashing algorithms weren’t used for the use of encryption but data compression.The first person to use hashing was HP Luhn. HP Luhn, in an internal memo of IBM written in 1953, talked about putting information into buckets to speed up a searches. For example, a phone number like 508 905 9318 would be broken down into 5 numbers (50,89,05,93,18) and a new set of numbers was generated by adding the digits together (5,17,5,12,9), or bucket 5175129. Now if we needed to retrieve this phone number and the relevant information that is grouped with the phone number, we just need to calculate the hash value. Although this hash bucket may have multiple values, it's easier to search through a smaller bucket versus the entire database. Over the years, computer scientists have improved his algorithms and is now used in a variety of contexts such as cryptography, graphics, and as we talk about in this article, security. The common type of hashing algorithm we use in the security sector is known as password hashing. Password hashing takes the plaintext password, and turns it into a series of unintelligible characters called ciphertext. This way if a hacker wants these passwords, they have to hack into the database to get these passwords,and they have to decrypt the ciphertext which is extremely complex if you don’t know the specifics of the algorithms. Our paper will be more specifically looking at a category of algorithms called Secure Hash Algorithm, or SHA.  
 
In today’s world, the average person has 70-80 different passwords across multiple accounts. While users wouldn’t care if their Webkinz password got leaked, bank account details being stolen is much more detrimental to users. In order to keep them safe, banks are required by the FTC to have proper security to keep users passwords safe. The common algorithm used is hashing. Technically speaking, hashing is a method of making a finite string of characters into a fixed size. Early hashing algorithms weren’t used for the use of encryption but data compression.The first person to use hashing was HP Luhn. HP Luhn, in an internal memo of IBM written in 1953, talked about putting information into buckets to speed up a searches. For example, a phone number like 508 905 9318 would be broken down into 5 numbers (50,89,05,93,18) and a new set of numbers was generated by adding the digits together (5,17,5,12,9), or bucket 5175129. Now if we needed to retrieve this phone number and the relevant information that is grouped with the phone number, we just need to calculate the hash value. Although this hash bucket may have multiple values, it's easier to search through a smaller bucket versus the entire database. Over the years, computer scientists have improved his algorithms and is now used in a variety of contexts such as cryptography, graphics, and as we talk about in this article, security. The common type of hashing algorithm we use in the security sector is known as password hashing. Password hashing takes the plaintext password, and turns it into a series of unintelligible characters called ciphertext. This way if a hacker wants these passwords, they have to hack into the database to get these passwords,and they have to decrypt the ciphertext which is extremely complex if you don’t know the specifics of the algorithms. Our paper will be more specifically looking at a category of algorithms called Secure Hash Algorithm, or SHA.  
  
== What is SHA ==
+
== What is SHA? ==
  
 
SHA is a family of hashing algorithms developed by the NSA and is published by the National Institute of Standards and Technology (NIST). First SHA algorithm, SHA-0, can input 160 bit messages and outputs a hashed value that is 40 values. This type of algorithm didn’t have much of a use due to the fact that it had a security flaw and was replaced with SHA-1 in 1995. There are several uses for SHA-1. We obviously talked about the use of SHA-1 for password hashing, but there are also uses for verification. Say we want to download a file from a website other than the developers website. If we can use the SHA1 hashed value of the file from the website and compare it to the developers, if the values don’t line up, we know that the file is not only not the same but could also contain malware. These are just some of the uses for SHA 1. But the question remains, how exactly does the SHA 1 algorithm work?
 
SHA is a family of hashing algorithms developed by the NSA and is published by the National Institute of Standards and Technology (NIST). First SHA algorithm, SHA-0, can input 160 bit messages and outputs a hashed value that is 40 values. This type of algorithm didn’t have much of a use due to the fact that it had a security flaw and was replaced with SHA-1 in 1995. There are several uses for SHA-1. We obviously talked about the use of SHA-1 for password hashing, but there are also uses for verification. Say we want to download a file from a website other than the developers website. If we can use the SHA1 hashed value of the file from the website and compare it to the developers, if the values don’t line up, we know that the file is not only not the same but could also contain malware. These are just some of the uses for SHA 1. But the question remains, how exactly does the SHA 1 algorithm work?
  
== SHA-1 Walkthrough ==
+
== SHA-1: A Good Starting Point ==
  
 
===== Step 1: =====
 
===== Step 1: =====
Line 250: Line 250:
 
     HH = '''f7ff9e8b7bb2e09b70935a5d785e0cc5d9d0abf0'''
 
     HH = '''f7ff9e8b7bb2e09b70935a5d785e0cc5d9d0abf0'''
  
== Weaknesses of Sha1 ==
+
== Why Don't we Still Use SHA1? ==
 +
 
 
An intuitive way to break Sha1 relies on a simple concept in Mathematics known as the pigeonhole principle. Where there are 20 pigeon holes and 21 pigeons, if we fit all the pigeons in a box there will have to have more than one pigeon in a box. It is the case where a function maps a set m to a set n where the length of set n is less than m. The same applies for Sha1, but also Sha2 and all hashing functions since the inputs are [theoretically] infinite, but the output is finite. When two different inputs have the same output this is known as a “collision”.  
 
An intuitive way to break Sha1 relies on a simple concept in Mathematics known as the pigeonhole principle. Where there are 20 pigeon holes and 21 pigeons, if we fit all the pigeons in a box there will have to have more than one pigeon in a box. It is the case where a function maps a set m to a set n where the length of set n is less than m. The same applies for Sha1, but also Sha2 and all hashing functions since the inputs are [theoretically] infinite, but the output is finite. When two different inputs have the same output this is known as a “collision”.  
  
Line 257: Line 258:
 
Google was successfully able to find a collision and employed techniques that reduced the complexity of the computations making it 100,000 times faster than brute forcing it. Even with this Google still used expensive hardware making this only feasible for well funded adversaries, but this attack could get easier as computers get faster. As well, the Chosen-Prefix Collision reduces the complexity from 2^80 (brute force) to 2^~61 which because it is exponential is a significant difference in terms of effort needed to accomplish this. This attack however still requires the adversaries to be well funded. Regardless, it is proof that Sha1 needs to be retired.  
 
Google was successfully able to find a collision and employed techniques that reduced the complexity of the computations making it 100,000 times faster than brute forcing it. Even with this Google still used expensive hardware making this only feasible for well funded adversaries, but this attack could get easier as computers get faster. As well, the Chosen-Prefix Collision reduces the complexity from 2^80 (brute force) to 2^~61 which because it is exponential is a significant difference in terms of effort needed to accomplish this. This attack however still requires the adversaries to be well funded. Regardless, it is proof that Sha1 needs to be retired.  
  
Now it would seem that the issue of using collisions to bypass a hashing algorithm would seem universal and it is, but it is more challenging when the output is longer, as it is in Sha2 (2^160 vs 2^224 Minimum), since the probability of getting a collision is less likely and Sha1 collisions attacks were mostly reserved for well funded parties. In addition to Sha2 being more complex as will be shown. Discorgaing adversaries from using it since it is not practical to do, which is why organizations have moved away from Sha1 to newer hashing algorithms.
+
Now it would seem that the issue of using collisions to bypass a hashing algorithm would seem universal and it is, but it is more challenging when the output is longer, as it is in Sha2 (2^160 vs 2^224 Minimum), since the probability of getting a collision is less likely and Sha1 collisions attacks were mostly reserved for well funded parties. In addition to Sha2 being more complex as will be shown. Discouraging adversaries from using it since it is not practical to do, which is why organizations have moved away from Sha1 to newer hashing algorithms.
 +
 
 +
 
 +
== The Solution: SHA2 ==
 +
 
 +
Due to the limitations of SHA1 previously explained, the NSA designed and published SHA2 in 2011. SHA2 comes in a variety of output sizes, but for the purpose of this paper, we will be looking at SHA256, which outputs a 256-bit hash value.
 +
 
 +
<small>
 +
====STEP 1: Padding====
 +
</small>
 +
 
 +
Similar to SHA1, we begin with the same preprocessing step that turns our input value into 512-bit chunks. For the string “Hello”, we will again have 1 chunk with the value:
 +
 
 +
0x4865 6C6C 6F80 [28 16-bit words of 0] 0028
 +
 
 +
 
 +
<small>
 +
====STEP 2: Word Chunking & Extension====
 +
</small>
 +
 
 +
For each chunk, we will run a similar extension function as SHA1, except we will only extend our original 16 32-bit words to 64 words rather than 80. While this may seem less secure, the actual extension function is a bit more complex and performs 9 additional operations at each step:
 +
 
 +
For i = 16 to 63:
 +
s0 = (w[i-15] right-rotate 7) xor (w[i-15] right-rotate 18) xor (w[i-15] right-shift 3)
 +
s1 = (w[i-2] right-rotate 17) xor (w[i-2] right-rotate 19) xor (w[i-2] right-shift 10)
 +
w[i] = w[i-16] + w[i-7] + s0 + s1
 +
 
 +
Conceptually, this step is just like a more advanced version of the Fibonacci sequence. Both iteratively generate proceeding terms by some function of previous terms, however, this algorithm utilizes 4 non-consecutive, pre-existing terms rather than 2 consecutive pre-existing terms. This relation to Fibonacci helps us better realize why this step in SHA is so good at producing seemingly random output. Much like Fibonacci, even though change may occur slowly at the start, it will quickly snowball into more and more complex terms, and this is exactly what we will see in the upcoming example.
 +
 
 +
If we apply this algorithm to the example chunk, we have:
 +
 
 +
// the 64 words/terms we are generating
 +
w[64] = {
 +
0110 1000 0110 1001 1000 0000 0000 0000,
 +
0000 0000 0000 0000 0000 0000 0000 0000 x 14 times,
 +
0000 0000 0000 0000 0110 1000 0110 1001,
 +
...remaining 48 are not set yet
 +
}
 +
 
 +
For i = 16 (the first iteration):
 +
s0 = (w[1] right-rotate 7) xor (w[1] right-rotate 18) xor (w[1] right-shift 3)
 +
    = (0x6F800000 right-rotate 7) xor (0x6F800000 right-rotate 18) xor (0x6F800000 right-shift 3)
 +
    = 0xD2F1BE0
 +
s1 = (w[i-2] right-rotate 17) xor (w[i-2] right-rotate 19) xor (w[i-2] right-shift 10)
 +
    = (w[i-2] right-rotate 17) xor (w[i-2] right-rotate 19) xor (w[i-2] right-shift 10)
 +
    = 0
 +
w[16] = w[i-16] + s0 + w[i-7] + s1
 +
          = 0x68698000 + 0xD2F1BE0 + 0 + 0
 +
          = 0x5594884C
 +
 
 +
As you may notice, in this first iteration, w[16] is only 2 of the 4 numbers summed were non-zero, making for somewhat poor randomness. Think of this like the duplicate 1 in the Fibonacci sequence, because most of the original 16 terms are 0s, we will observe very little change at the start. But as we continue through iterations, terms will appear more and more complex and seemingly random. To exemplify this, after all 64 iterations, we will have:
 +
 
 +
w[64] = {
 +
0x48656C6C, 0x6F800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0,
 +
0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28,
 +
0x5594884C, 0x6F910000, 0xD53AC55A, 0xA01BDE7A, 0x3A337E8B, 0x94DA02F9, 0xD09A76A8, 0x969B56C2,
 +
0xE54654C3, 0x96D784A5, 0x80DCBE18, 0x6D174ADB, 0x5DC96A53, 0x1CC815A3, 0x7F1A0DCE, 0x9DB3E25F,
 +
0x80DA5DC2, 0x9C0CA81E, 0xBEA91B8B, 0x8DA1AF1A, 0x66A32861, 0xCC59DDF4, 0xA1C28A29, 0xFB405DB4,
 +
0x4EAACB84, 0x896EE197, 0xB4ED8DEF, 0x782C4A4A, 0xE252B57C, 0x7B6C0231, 0xDA9EE233, 0x700956F3,
 +
0xBC709C4D, 0x1900A949, 0xE3BFB13B, 0xB581CF14, 0x980047E9, 0x6B30284B, 0x9EEF960A, 0x7C902E42,
 +
0x27E9FFC6, 0x2AB47040, 0xB3E8DA4F, 0xF211A94, 0x30DCBA1F, 0x8CE0FD92, 0xDECD3E41, 0xA5312439
 +
}
 +
 
 +
 
 +
<small>
 +
====STEP 3: Compression====
 +
</small>
 +
 
 +
From here, SHA2 will compress these w-values onto our final hash values. Similar to SHA1, our final hash values, or h-values, will be initialized to seemingly random numbers (the fractional portions of the roots of the first few primes in this case) and will transform as we consider each chunk. But, unlike SHA1, SHA2 will chew on 8 of these hash values. The pseudo-code for this step is as follows:
 +
 
 +
<div style="margin-left: 50px">
 +
// initial hash-values, or h-values
 +
h[8] = {
 +
<div style="margin-left: 50px">
 +
0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,<br/>
 +
0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19
 +
</div>
 +
}
 +
 
 +
For each chunk:
 +
<div style="margin-left: 50px">
 +
// copy current h-values into an array, c
 +
c = h
 +
 
 +
// hash up c-values
 +
For i = 0 to 63:
 +
<div style="margin-left: 50px">
 +
// compute 2 terms t1 and t2 to factor into hash-values
 +
s1 = (c[4] right-rotate 6) xor (c[4] right-rotate 11) xor (c[4] right-rotate 25)<br/>
 +
ch = (c[4] and c[5]) xor ((not c[4]) and c[6])<br/>
 +
t1 = c[7] + s1 + ch + k[i] + w[i]<br/>
 +
s0 = (c[0] right-rotate 2) xor (c[0] right-rotate 13) xor (c[0] right-rotate 22)<br/>
 +
maj = (c[0] and c[1]) right-rotate (c[0] and c[2]) right-rotate (c[1] and c[2])<br/>
 +
t2 = s0 + maj<br/>
 +
 
 +
// rotate hash-values<br/>
 +
For i = 1 to 7:<br/>
 +
<div style="margin-left: 50px">
 +
c[i] = c[i - 1]<br/>
 +
</div>
 +
// integrate computed terms into hash-values
 +
c[4] += t1<br/>
 +
c[0] = t1 + t2
 +
</div>
 +
 
 +
// modify original h-values using new c-values
 +
For i = 0 to 7:
 +
<div style="margin-left: 50px">
 +
h[i] += c[i]
 +
</div>
 +
</div>
 +
</div>
 +
 
 +
In contrast to SHA1, this computation differs in 3 main ways:
 +
 
 +
* Only 64 rounds of computation are performed as opposed to 80.
 +
* More computation is performed at each step. SHA2 will start with 8 32-bit values rather than 5 and when cycling those 8 values, SHA2 will add not only to the first value, c[0], but the fifth as well, c[4].
 +
* Rather than using 4 distinct k-values, SHA2 utilizes 64 k-values (which are the fractional portion of the cubic root of the first 64 primes).
 +
 
 +
For our example, the first iteration would look like:
 +
 
 +
<div style="margin-left: 50px">
 +
c = original 8 h-values
 +
 
 +
For i = 0:
 +
<div style="margin-left: 50px">
 +
s1 = (c[4] right-rotate 6) xor (c[4] right-rotate 11) xor (c[4] right-rotate 25)<br/>
 +
    = 0x3587272B<br/>
 +
ch = (c[4] and c[5]) xor ((not c[4]) and c[6])<br/>
 +
    = (0x510E527Ff and 0x9b05688c) xor ((not 0x510e527f) and 0x1f83d9ab)<br/>
 +
    = 0x1F85C98C<br/>
 +
t1 = c[7] + s1 + ch + k[i=0] + w[i=0]<br/>
 +
    = 0x5BE0CD19 + 0x3587272B + 0x1F85C98C + 0x428A2F98 + 0x48656C6C<br/>
 +
    = 0x3BDD59D4<br/>
 +
 +
s0 = (c[0] right-rotate 2) xor (c[0] right-rotate 13) xor (c[0] right-rotate 22)<br/>
 +
    = 0xCE20B47E<br/>
 +
mj = (c[0] and c[1]) xor (c[0] and c[2]) xor (c[1] and c[2])<br/>
 +
    = 0x3A6FE667<br/>
 +
      t2 = s0 + mj<br/>
 +
    = 0x08909AE5<br/>
 +
</div>
 +
c[7] = c[6] = 0x1F83D9AB<br/>
 +
c[6] = c[5] = 0x9B05688C<br/>
 +
c[5] = c[4] = 0x510E527F<br/>
 +
c[4] = c[3] + t1 = 0xE12D4F0E<br/>
 +
c[3] = c[2] = 0x3C6EF372<br/>
 +
c[2] = c[1] = 0xBB67AE85<br/>
 +
c[1] = c[0] = 0x6A09E667<br/>
 +
c[0] = t1 + t2 = 0x446DF4B9
 +
</div>
 +
 
 +
After all 64 iterations, our h-values become:
 +
 
 +
<div style="margin-left: 50px">
 +
h[7] = h[7] + c[7] = 0x5be0cd19 + 0x1F83D9AB = 0x185F8DB3<br/>
 +
h[6] = h[6] + c[6] = 0x1f83d9ab + 0x9B05688C = 0x2271FE25<br/>
 +
h[5] = h[5] + c[5] = 0x9b05688c + 0x510E527F = 0xF561A6FC<br/>
 +
h[4] = h[4] + c[4] = 0x510e527f + 0xE12D4F0E = 0x938B2E26<br/>
 +
h[3] = h[3] + c[3] = 0xa54ff53a + 0x3C6EF372 = 0x4306EC30<br/>
 +
h[2] = h[2] + c[2] = 0x3c6ef372 + 0xBB67AE85 = 0x4EDA5180<br/>
 +
h[1] = h[1] + c[1] = 0xbb67ae85 + 0x6A09E667 = 0x7D17648<br/>
 +
h[0] = h[0] + c[0] = 0x6a09e667 + 0x446DF4B9 = 0x26381969
 +
</div>
 +
 
 +
<small>
 +
====STEP 4: Final Hash Assembly====
 +
</small>
 +
 
 +
After all previous chunks have been compressed onto our h-values, our final hash is simply appending these h-values as so:
 +
 
 +
<div style="text-align: center">
 +
h0 append h1 append h2 append h3 append h4 append h5 append h6 append h7
 +
</div>
 +
<div style="text-align: center">
 +
0x185F8DB3 2271FE25 F561A6FC 938B2E26 4306EC30 4EDA5180 7D17648 26381969
 +
</div>

Revision as of 04:16, 30 November 2022

Introduction

In today’s world, the average person has 70-80 different passwords across multiple accounts. While users wouldn’t care if their Webkinz password got leaked, bank account details being stolen is much more detrimental to users. In order to keep them safe, banks are required by the FTC to have proper security to keep users passwords safe. The common algorithm used is hashing. Technically speaking, hashing is a method of making a finite string of characters into a fixed size. Early hashing algorithms weren’t used for the use of encryption but data compression.The first person to use hashing was HP Luhn. HP Luhn, in an internal memo of IBM written in 1953, talked about putting information into buckets to speed up a searches. For example, a phone number like 508 905 9318 would be broken down into 5 numbers (50,89,05,93,18) and a new set of numbers was generated by adding the digits together (5,17,5,12,9), or bucket 5175129. Now if we needed to retrieve this phone number and the relevant information that is grouped with the phone number, we just need to calculate the hash value. Although this hash bucket may have multiple values, it's easier to search through a smaller bucket versus the entire database. Over the years, computer scientists have improved his algorithms and is now used in a variety of contexts such as cryptography, graphics, and as we talk about in this article, security. The common type of hashing algorithm we use in the security sector is known as password hashing. Password hashing takes the plaintext password, and turns it into a series of unintelligible characters called ciphertext. This way if a hacker wants these passwords, they have to hack into the database to get these passwords,and they have to decrypt the ciphertext which is extremely complex if you don’t know the specifics of the algorithms. Our paper will be more specifically looking at a category of algorithms called Secure Hash Algorithm, or SHA.

What is SHA?

SHA is a family of hashing algorithms developed by the NSA and is published by the National Institute of Standards and Technology (NIST). First SHA algorithm, SHA-0, can input 160 bit messages and outputs a hashed value that is 40 values. This type of algorithm didn’t have much of a use due to the fact that it had a security flaw and was replaced with SHA-1 in 1995. There are several uses for SHA-1. We obviously talked about the use of SHA-1 for password hashing, but there are also uses for verification. Say we want to download a file from a website other than the developers website. If we can use the SHA1 hashed value of the file from the website and compare it to the developers, if the values don’t line up, we know that the file is not only not the same but could also contain malware. These are just some of the uses for SHA 1. But the question remains, how exactly does the SHA 1 algorithm work?

SHA-1: A Good Starting Point

Step 1:

Initialize 5 strings as "Hash Values"

H1 = 0x67452301
H2 = 0xEFCDAB89
H3 = 0x98BADCFE
H4 = 0x10325476
H5 = 0xC3D2E1F0


Step 2:

Take the word you want to hash (in binary), and append a 1 to the end of it. Then append as many zeros as it takes to make it divisible by 512, with the length of the message in a 64 bit integer appended at the end of the string.

Example:

The word "Hello" in binary is:

                     01001000 01100101 01101100 01101100 01101111
                       (H)      (e)      (l)      (l)      (o)

Add 1 to the end:

= 01001000011001010110110001101100011011111

Since "Hello" is less than 448 we add 0’s until the string is 448 bits long:

= 01001000011001010110110001101100011011111000…0 (len = 448 bits)

Lastly take the length of the string before processing (40 bits in this case) append that as a 64 bit integer

= ...0000101000 (length of added bits = 64)

So total length is 512 in this example

010010000110010101101100011011000110111110………0101000


Step 3A:

Break message into 512-bit chunks

Taking the example from above, since it is 512 bits, we will only have one chunk

Step 3B:

Break each chunk into 16, 32-bit words

Example:

The words would be

    W0 = 01001000011001010110110001101100
W1 = 01101111100000000000000000000000
W2-W14 = 00000000000000000000000000000000
W15 = 00000000000000000000000000101000

Step 4:

Extend the first chunk to 80 32-bit words using the function


for i from 16 to 79
     w[i] = (w[i-3] xor w[i-8] xor w[i-14] xor w[i-16]) leftrotate 1

Example:

 Using the example we have been using, the first iteration would go like this:
   w[16] = (w[16-3] xor w[16-8] xor w[16-14] xor w[16-16]) leftrotate 1
   w[16] = (w[13] xor w[8] xor w[2] xor w[0]) leftrotate 1
 The xor function will compare the bits of the two strings in in each index
and give an output based on the input of the the strings
      A        B       A xor B
      0        0    ->    0
      0        1    ->    1 
      1        0    ->    1
      1        1    ->    0
   w[13] = 00000000000000000000000000000000
    xor
   w[8]  = 00000000000000000000000000000000
    xor
   w[2]  = 00000000000000000000000000000000
    xor
   w[0]  = 01001000011001010110110001101100

         = 01001000011001010110110001101100
         
The leftrotate x function shifts each bit x times to the left. Any bits 
that are shifted past the beginning of the string are cycled back to the end of the string.
Taking the string we got, we leftrotate the string one bit
01001000011001010110110001101100
= 10010000110010101101100011011000


So, after the first iteration W16 is added to the chunk as:

W16 = 10010000110010101101100011011000
After all of the iterations, we should have a chunk of 2560 bits
(From now on we will be switching from binary representation to hex for simplicity)

Step 5A:

 Initialize The "Holding Values" for the chunk with "Hash Values"
 A = H1
 B = H2
 C = H3
 D = H4
 E = H5

Step 5B:

 For each word in the chunk, obtain an F and K value
   First 20 words:
      K = 0x5A827999
      F = (B ∧ C)∨((¬B) ∧ D)
   Next 20 words:
      K = 0x6ED9EBA1
      F = B ⊕ C ⊕ D 
   Next 20 words:
      K = 0x8F1BBCDC
      F = (B ∧ C) v (B ∧ D) v (C ∧ D)
   Last 20 words:
      K = 0xCA62C1D6
      F =  B ⊕ C ⊕ D

Example:

On the first iteration,
  K = 0x5A827999
  F = (0xEFCDAB89 ∧ 0x98BADCFE) v ((NOT 0xEFCDAB89) ∧ 0x10325476)
          (B)           (C)             (¬B)             (D)
  F = 0x32327676


Step 5C:

  Assign new "Holding Values" after every iteration

Temp = (A leftrotate 5) + F + E + K + w[i]

E = D
D = C
C = (B leftrotate 30)
B = A
A = Temp

Example:

 After iteration 1:
   Temp = (A leftrotate 5) + F + E + K + w[0]
   A leftrotate 5 = E8A4602C
   F = 32327676
   E = C3D2E1F0
   K = 5A827999
   W0 = 48656C6C
 So we assign the "Holding Values" as:
   Temp = 281919E97
   E = 10325476
   D = 98BADCFE
   C = (leftrotate 30 B) = EFCDAB89
   B = 67452301
   A = 281919E97 

Step 6:

 Add "Holding Values" to "Hash Values"
   H1 = H1 + A
   H2 = H2 + B
   H3 = H3 + C
   H4 = H4 + D
   H5 = H5 + E

Examples:

 (Assume "Holding Values" from the last step are those of the final iteration)
   H1 = 0x67452301 + 0x281919E97 = 0x2E8D6C198
   H2 = 0xEFCDAB89 + 0x67452301  = 0x15712CE8A
   H3 = 0x98BADCFE + 0xEFCDAB89  = 0x188888887
   H4 = 0x10325476 + 0x98BADCFE  = 0xA8ED3174
   H5 = 0xC3D2E1F0 + 0x10325476  = 0xD4053666


Repeat steps 5 and 6 for each chunk. After the last chunk, move on to step 7

Step 7

Complete hash by appending H values back together using:

HH = (H1 leftrotate 128) V (H2 leftrotate 96) V (H3 leftrotate 64) V (H4 leftrotate 32) V H5

Example: If these are the final hashes from iterating through all chunks

   H1 = B3099B3DF4683F306175ED806E58C04AFFE622F6
H2 = 372AE26109B3DE38C9E56BB84E9D6DE2FB28ABFB
H3 = 28F142FF30F862A2405D9232E85714C23C567E9B
H4 = 91F2DF811E4615B20F161B86FD746874FA139A6E
H5 = ABED8613F2D98B8B7166B11E2AF8EFEC08197000

Then after doing the leftrotates

   H1 leftrotate 128 = FFE622F6B3099B3DF4683F306175ED806E58C04A
   H2 leftrotate 96  = 4E9D6DE2FB28ABFB372AE26109B3DE38C9E56BB0
   H3 leftrotate 64  = 405D9232E85714C23C567E9B28F142FF30F862E0
   H4 leftrotate 32  = F2D98B8B7166B11E2AF8EFEC0819700C91F2DF90
   H5 stays the same

Finally, adding the strings together gives us:

   HH = f7ff9e8b7bb2e09b70935a5d785e0cc5d9d0abf0

Why Don't we Still Use SHA1?

An intuitive way to break Sha1 relies on a simple concept in Mathematics known as the pigeonhole principle. Where there are 20 pigeon holes and 21 pigeons, if we fit all the pigeons in a box there will have to have more than one pigeon in a box. It is the case where a function maps a set m to a set n where the length of set n is less than m. The same applies for Sha1, but also Sha2 and all hashing functions since the inputs are [theoretically] infinite, but the output is finite. When two different inputs have the same output this is known as a “collision”.

The issue with collisions is that there is no way of knowing if the input given matches the original or intended input. So, if an attacker can consistently get a collision this would make Sha1 a weak algorithm.

Google was successfully able to find a collision and employed techniques that reduced the complexity of the computations making it 100,000 times faster than brute forcing it. Even with this Google still used expensive hardware making this only feasible for well funded adversaries, but this attack could get easier as computers get faster. As well, the Chosen-Prefix Collision reduces the complexity from 2^80 (brute force) to 2^~61 which because it is exponential is a significant difference in terms of effort needed to accomplish this. This attack however still requires the adversaries to be well funded. Regardless, it is proof that Sha1 needs to be retired.

Now it would seem that the issue of using collisions to bypass a hashing algorithm would seem universal and it is, but it is more challenging when the output is longer, as it is in Sha2 (2^160 vs 2^224 Minimum), since the probability of getting a collision is less likely and Sha1 collisions attacks were mostly reserved for well funded parties. In addition to Sha2 being more complex as will be shown. Discouraging adversaries from using it since it is not practical to do, which is why organizations have moved away from Sha1 to newer hashing algorithms.


The Solution: SHA2

Due to the limitations of SHA1 previously explained, the NSA designed and published SHA2 in 2011. SHA2 comes in a variety of output sizes, but for the purpose of this paper, we will be looking at SHA256, which outputs a 256-bit hash value.

STEP 1: Padding

Similar to SHA1, we begin with the same preprocessing step that turns our input value into 512-bit chunks. For the string “Hello”, we will again have 1 chunk with the value:

0x4865 6C6C 6F80 [28 16-bit words of 0] 0028


STEP 2: Word Chunking & Extension

For each chunk, we will run a similar extension function as SHA1, except we will only extend our original 16 32-bit words to 64 words rather than 80. While this may seem less secure, the actual extension function is a bit more complex and performs 9 additional operations at each step:

For i = 16 to 63: s0 = (w[i-15] right-rotate 7) xor (w[i-15] right-rotate 18) xor (w[i-15] right-shift 3) s1 = (w[i-2] right-rotate 17) xor (w[i-2] right-rotate 19) xor (w[i-2] right-shift 10) w[i] = w[i-16] + w[i-7] + s0 + s1

Conceptually, this step is just like a more advanced version of the Fibonacci sequence. Both iteratively generate proceeding terms by some function of previous terms, however, this algorithm utilizes 4 non-consecutive, pre-existing terms rather than 2 consecutive pre-existing terms. This relation to Fibonacci helps us better realize why this step in SHA is so good at producing seemingly random output. Much like Fibonacci, even though change may occur slowly at the start, it will quickly snowball into more and more complex terms, and this is exactly what we will see in the upcoming example.

If we apply this algorithm to the example chunk, we have:

// the 64 words/terms we are generating w[64] = { 0110 1000 0110 1001 1000 0000 0000 0000, 0000 0000 0000 0000 0000 0000 0000 0000 x 14 times, 0000 0000 0000 0000 0110 1000 0110 1001, ...remaining 48 are not set yet }

For i = 16 (the first iteration): s0 = (w[1] right-rotate 7) xor (w[1] right-rotate 18) xor (w[1] right-shift 3) = (0x6F800000 right-rotate 7) xor (0x6F800000 right-rotate 18) xor (0x6F800000 right-shift 3) = 0xD2F1BE0 s1 = (w[i-2] right-rotate 17) xor (w[i-2] right-rotate 19) xor (w[i-2] right-shift 10) = (w[i-2] right-rotate 17) xor (w[i-2] right-rotate 19) xor (w[i-2] right-shift 10) = 0 w[16] = w[i-16] + s0 + w[i-7] + s1 = 0x68698000 + 0xD2F1BE0 + 0 + 0 = 0x5594884C

As you may notice, in this first iteration, w[16] is only 2 of the 4 numbers summed were non-zero, making for somewhat poor randomness. Think of this like the duplicate 1 in the Fibonacci sequence, because most of the original 16 terms are 0s, we will observe very little change at the start. But as we continue through iterations, terms will appear more and more complex and seemingly random. To exemplify this, after all 64 iterations, we will have:

w[64] = { 0x48656C6C, 0x6F800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x5594884C, 0x6F910000, 0xD53AC55A, 0xA01BDE7A, 0x3A337E8B, 0x94DA02F9, 0xD09A76A8, 0x969B56C2, 0xE54654C3, 0x96D784A5, 0x80DCBE18, 0x6D174ADB, 0x5DC96A53, 0x1CC815A3, 0x7F1A0DCE, 0x9DB3E25F, 0x80DA5DC2, 0x9C0CA81E, 0xBEA91B8B, 0x8DA1AF1A, 0x66A32861, 0xCC59DDF4, 0xA1C28A29, 0xFB405DB4, 0x4EAACB84, 0x896EE197, 0xB4ED8DEF, 0x782C4A4A, 0xE252B57C, 0x7B6C0231, 0xDA9EE233, 0x700956F3, 0xBC709C4D, 0x1900A949, 0xE3BFB13B, 0xB581CF14, 0x980047E9, 0x6B30284B, 0x9EEF960A, 0x7C902E42, 0x27E9FFC6, 0x2AB47040, 0xB3E8DA4F, 0xF211A94, 0x30DCBA1F, 0x8CE0FD92, 0xDECD3E41, 0xA5312439 }


STEP 3: Compression

From here, SHA2 will compress these w-values onto our final hash values. Similar to SHA1, our final hash values, or h-values, will be initialized to seemingly random numbers (the fractional portions of the roots of the first few primes in this case) and will transform as we consider each chunk. But, unlike SHA1, SHA2 will chew on 8 of these hash values. The pseudo-code for this step is as follows:

// initial hash-values, or h-values h[8] = {

0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,
0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19

}

For each chunk:

// copy current h-values into an array, c c = h

// hash up c-values For i = 0 to 63:

// compute 2 terms t1 and t2 to factor into hash-values s1 = (c[4] right-rotate 6) xor (c[4] right-rotate 11) xor (c[4] right-rotate 25)
ch = (c[4] and c[5]) xor ((not c[4]) and c[6])
t1 = c[7] + s1 + ch + k[i] + w[i]
s0 = (c[0] right-rotate 2) xor (c[0] right-rotate 13) xor (c[0] right-rotate 22)
maj = (c[0] and c[1]) right-rotate (c[0] and c[2]) right-rotate (c[1] and c[2])
t2 = s0 + maj

// rotate hash-values
For i = 1 to 7:

c[i] = c[i - 1]

// integrate computed terms into hash-values c[4] += t1
c[0] = t1 + t2

// modify original h-values using new c-values For i = 0 to 7:

h[i] += c[i]

In contrast to SHA1, this computation differs in 3 main ways:

  • Only 64 rounds of computation are performed as opposed to 80.
  • More computation is performed at each step. SHA2 will start with 8 32-bit values rather than 5 and when cycling those 8 values, SHA2 will add not only to the first value, c[0], but the fifth as well, c[4].
  • Rather than using 4 distinct k-values, SHA2 utilizes 64 k-values (which are the fractional portion of the cubic root of the first 64 primes).

For our example, the first iteration would look like:

c = original 8 h-values

For i = 0:

s1 = (c[4] right-rotate 6) xor (c[4] right-rotate 11) xor (c[4] right-rotate 25)
= 0x3587272B
ch = (c[4] and c[5]) xor ((not c[4]) and c[6])
= (0x510E527Ff and 0x9b05688c) xor ((not 0x510e527f) and 0x1f83d9ab)
= 0x1F85C98C
t1 = c[7] + s1 + ch + k[i=0] + w[i=0]
= 0x5BE0CD19 + 0x3587272B + 0x1F85C98C + 0x428A2F98 + 0x48656C6C
= 0x3BDD59D4

s0 = (c[0] right-rotate 2) xor (c[0] right-rotate 13) xor (c[0] right-rotate 22)
= 0xCE20B47E
mj = (c[0] and c[1]) xor (c[0] and c[2]) xor (c[1] and c[2])
= 0x3A6FE667

      	t2 = s0 + mj

= 0x08909AE5

c[7] = c[6] = 0x1F83D9AB
c[6] = c[5] = 0x9B05688C
c[5] = c[4] = 0x510E527F
c[4] = c[3] + t1 = 0xE12D4F0E
c[3] = c[2] = 0x3C6EF372
c[2] = c[1] = 0xBB67AE85
c[1] = c[0] = 0x6A09E667
c[0] = t1 + t2 = 0x446DF4B9

After all 64 iterations, our h-values become:

h[7] = h[7] + c[7] = 0x5be0cd19 + 0x1F83D9AB = 0x185F8DB3
h[6] = h[6] + c[6] = 0x1f83d9ab + 0x9B05688C = 0x2271FE25
h[5] = h[5] + c[5] = 0x9b05688c + 0x510E527F = 0xF561A6FC
h[4] = h[4] + c[4] = 0x510e527f + 0xE12D4F0E = 0x938B2E26
h[3] = h[3] + c[3] = 0xa54ff53a + 0x3C6EF372 = 0x4306EC30
h[2] = h[2] + c[2] = 0x3c6ef372 + 0xBB67AE85 = 0x4EDA5180
h[1] = h[1] + c[1] = 0xbb67ae85 + 0x6A09E667 = 0x7D17648
h[0] = h[0] + c[0] = 0x6a09e667 + 0x446DF4B9 = 0x26381969

STEP 4: Final Hash Assembly

After all previous chunks have been compressed onto our h-values, our final hash is simply appending these h-values as so:

h0 append h1 append h2 append h3 append h4 append h5 append h6 append h7

0x185F8DB3 2271FE25 F561A6FC 938B2E26 4306EC30 4EDA5180 7D17648 26381969

Alumni Liaison

Abstract algebra continues the conceptual developments of linear algebra, on an even grander scale.

Dr. Paul Garrett