GSM Shop GSM Shop
GSM-Forum  

Welcome to the GSM-Forum forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features.
Only registered members may post questions, contact other members or search our database of over 8 million posts.

Registration is fast, simple and absolutely free so please - Click to REGISTER!

If you have any problems with the registration process or your account login, please contact contact us .

Go Back   GSM-Forum > Other Gsm/Mobile Related Forums > GSM Programming & Reverse Engineering


GSM Programming & Reverse Engineering Here you can post all Kind of GSM Programming and Reverse Engineering tools and Secrets.

Reply
 
LinkBack Thread Tools Display Modes
Old 07-26-2011, 08:54   #1 (permalink)
No Life Poster
 
..:: Devil_king ::..'s Avatar
 
Join Date: Feb 2008
Location: Hell..... Bcoz i am devil_king
Age: 38
Posts: 1,922
Member: 696623
Status: Offline
Sonork: 100.1601050
Thanks Meter: 526
Understanding Hash Algorithms


I can't go over anything in a tutorial so I suggest you further your knowledge by gaining access to a book about cryptography.


Hash Functions:

Hash value is generated by a function H of the form:
h=H(M)

M is the variable length message and H(M) the fixed length has value. The hash function itself is not secret so means are taken to protect the hash value. An avalanche effect will occur. Inputs such as "hi" and "hi." will produce extremely different outputs.


According to Stallings the requirements for a hash function are:

1. H an be applied to a block of data of any size
2. H produces a fixed-length output.
3. H(x) is relatively easy to compute for any given x, making both hardware and software implementations practical
4. For any given code h, it is computationally infeasible to find x such that H(x)=h. This is sometimes referred to as the one-way property.
5. For any given block x, it is computationally infeasible to find y≠x with H(y)=H(x). This is sometimes referred to as weak collision resistance.
6. IT is computationally infeasible to find any pair (x,y) such that H(x)=H(y). This is sometimes referred to as strong collision reistance.

The first three being requirements for usable application of a has to message authentication. The fourth being the one way property. The fifth assuring that a different message hashing to the same value as a given message cannot be found. The sixth referring to how resistant the has function is to the birthday attack.


Operation of Simple Functions:

Input is viewed as a sequence of n-bit blocks. Input is processed one block at a time in a repetitive mode to produce an n-bit hash function.

Example of a simple hash function (I used the _ to indicate subscript)

C_i = b_i1 ⊕ b_i2 ⊕ ... ⊕ b_im

This is a very basic example. I won't be providing anything more complex, if you want to see one do some research.


Security of Hash:

Attacks on hash functions are grouped into brute force attacks and cryptanalysis. I personally like to extend the attacks to a third group: dictionary attacks. Please remember that this is not an official group so if you speak to a professor or anyone and say this they may correct you.

Brute Force Attacks
:
You can find many definitions but I found the rsa's to be the most accurate.
"trying all (or a large fraction of all) possible values till the right value is found"

The strength of a hash function against this type of attack depends on the length of the hash code produced. For a code of n length the effort would be (I used ^ to indicate superscript)

One way: 2^n
Weak collision resistance: 2^n
Strong collision resistance: 2^(n/2)

As you can see brute forcing a hash code is extremely long!


Cryptanalysis
:
Cryptanalysis attacks seek to exploit some property to perform an attack that isn't exhaustive. Personally I find cryptanalysis on Hash functions to be extremely complex and difficult I myself don't understand it well enough to explain. Only if you are truly great at math and understand the structure of the function in detail do you stand a chance with this attack. I'll therefore just make a short summary of what the structure of a iterated hash function includes (This is the structure of popular hash's such as MD5):
*Initial value
*Chaining Variable
*ith input block
*compression algorithm
*number of input blocks
*length of hash code
*length of input block

Dictionary Attack
:
Once again remember that this isn't an official term nor is it the best suited term to use. I decided to include it since it is the most common way unprofessional crackers attempt to decrypt. Websites such as (http://md5online.net/) allow anyone with the knowledge of the type of hash to simply search a database that may have their hash stored. Of course this attack is useless with uncommon strings or long words. But with weak IV it is common to see the decryption.

"49f68a5c8493ec2c0bf489821c21fc3b" could simply be searched and the output of hi is returned to you!



Hash Algorithms:

I have decided to talk a bit about MD5 and SHA-1 because of their popularity and how often I see users wanting those type of hash's decrypted. I won't be talking about structure so much as that is rather long and complex. Instead I'll keep it short and sweet and talk about security.

MD5 Message Digest Algorithm:

Brief background: Developed by Ron Rivest at MIT. Formerly the most used secure hash algorithm. Currently it is broken and unsuitable for secure use.

MD5 takes in a random message of any length and puts out a 32 bit hexadecimal correspondent.


The strengths include:

*every bit of the hash code is a function of every bit of input
*results are well mixed
*Brute force attacks can take an extremely long time

Weaknesses include:

*It has been broken to say
*cryptanalysis attacks are very effective
*pseudocollision
*Dobbertin's attack enabling a collosion for the compression function

SHA-1:

Brief Background: Designed by the NSA. Most used SHA.

Takes in an input message less then a length of 2^64 bits and produces a 40 bit hexadecimal output.


Strengths and Weaknesses:

*Should be similar to MD5 since they are both derived from MD4

Should I use MD5 or SHA-1?

I would advise against using either but if we were to choose one or the other I would go with SHA-1.
*Speed:MD5 wins this round.
*Simplicity: Even
*Brute force attacks: SHA-1 wins this round.
*Cryptanalysis: SHA-1 wins this round.
*Dictionary Attack: SHA-1 wins this round. This has nothing to do with its design but simply because there are many more resources for cracking MD5 with a database.





Credit Due where owned
NA. “MD5.” Wikipedia. N.p., n.d. Web. 25 July 2011. <http://en.wikipedia.org/*wiki/*MD5>.
- - -. “SHA-1.” Wikipedia. N.p., n.d. Web. 25 July 2011. <http://en.wikipedia.org/*wiki/*SHA-1>.
Smart, Nigel. Cryptography: An introduction. N.p.: n.p., n.d. Print.
Stallings, William. Cryptography and network security Principles and practice. Upper Saddle: n.p., n.d. Print.
- - -. Network Security Essentials. N.p.: n.p., n.d. Print.
  Reply With Quote
Old 08-28-2011, 21:48   #2 (permalink)
Junior Member
 
Join Date: Aug 2011
Posts: 4
Member: 1644541
Status: Offline
Thanks Meter: 0
Hey *** hole you leeched my work

I published this a day before and you completely copied my work. You do NOT have permission to publish this.

Hack Forums
  Reply With Quote
Old 08-28-2011, 22:38   #3 (permalink)
Freak Poster
 
buds1's Avatar
 
Join Date: Apr 2009
Location: Austria / Vienna
Posts: 415
Member: 1002500
Status: Offline
Thanks Meter: 263
Welcome to the center of copy and paste
  Reply With Quote
Old 08-29-2011, 07:19   #4 (permalink)
No Life Poster
 
..:: Devil_king ::..'s Avatar
 
Join Date: Feb 2008
Location: Hell..... Bcoz i am devil_king
Age: 38
Posts: 1,922
Member: 696623
Status: Offline
Sonork: 100.1601050
Thanks Meter: 526
Quote:
Originally Posted by myworkwasleeche View Post
I published this a day before and you completely copied my work. You do NOT have permission to publish this.

Hack Forums
hi friend i am soory for i am using hack-forum info in other site without giveing any cradit
1http://forum.gsmhosting.com/vbb/f83/understanding-hash-algorithms-1316062/
2http://forum.gsmhosting.com/vbb/f83/android-tutorial-arp-spoofing-droidsheep-1327031/
3http://forum.gsmhosting.com/vbb/f83/3-hidden-modes-android-mobile-phones-1327030/

so i can't remove these post bcoz i am not have power to remove ...

but i make a soory post on all threds
  Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Simple question about algorithm used to generate unlocking codes drzonca x1x to x45/x50 1 02-16-2002 16:17
algorithme marcel x1x to x45/x50 0 08-14-2001 14:12
Help! I nothing can not understand! BE4-135 Ved Alcatel & TCL Old Models 3 07-13-2001 07:38
Still dont understand way FF00 Format1 Nokia Legacy Phones ( DCT-1 ,2 ,3 ,L ) 6 02-12-2001 10:23
Algorithm AAcaria Old Ericsson Phones & Sony Phones 2 07-16-1999 13:34

 



All times are GMT +1. The time now is 01:39.



Powered by Searchlight © 2024 Axivo Inc.
vBulletin Optimisation provided by vB Optimise (Pro) - vBulletin Mods & Addons Copyright © 2024 DragonByte Technologies Ltd.
- GSM Hosting Ltd. - 1999-2023 -
Page generated in 0.23724 seconds with 9 queries

SEO by vBSEO