The Birthday Paradox July 2011 1. Definition 2 Birthday attacks are a class of brute-force techniques that target the cryptographic hash functions. The.

Slides:



Advertisements
Similar presentations
Line Efficiency     Percentage Month Today’s Date
Advertisements

Unit Number Oct 2011 Nov 2011 Dec 2011 Jan 2012 Feb 2012 Mar 2012 Apr 2012 May 2012 Jun 2012 Jul 2012 Aug 2012 Sep (3/4 Unit) 7 8 Units.
HOW TO MAKE A CLIMATE GRAPH CLIMATE GRAPHING ASSIGNMENT PT.2.
Non Leap YearLeap Year DateDay NumberMod 7Day NumberMod 7 13-Jan Feb Mar Apr May Jun Jul
ProjectImpactResourcesDeadlineResourcesDeadline Forecast Plan Time Resources Risk 001xx 002xx 003xx 004xx 005xx 006xx 007xx TotalXX Example 1: Portfolio.
Hashes Lesson Introduction ●The birthday paradox and length of hash ●Secure hash function ●HMAC.
1 Upper Basin Snowpack as of 3/26/2014
Using the Trapezoidal Model to Derate NW Hydro Capacity Resource Adequacy Technical Committee July 25, 2007 Portland, Oregon.
The 6 steps of data collection: 1. Make predictions 2. Write a questionnaire 3. Collect data (Data Collection Sheet) 4. Make results tables 5. Draw graphs.
Windows Server 2008 R2 Oct 2009 Windows Server 2003
Jan 2016 Solar Lunar Data.
Explanation of Monthly Compensation Changes

The 6 steps of data collection:
A way to detect a collision…
Analyzing patterns in the phenomena
Q1 Jan Feb Mar ENTER TEXT HERE Notes

Project timeline # 3 Step # 3 is about x, y and z # 2
Average Monthly Temperature and Rainfall


Nuffield Free-Standing Mathematics Activities Music Festival
Mammoth Caves National Park, Kentucky
2017 Jan Sun Mon Tue Wed Thu Fri Sat

FOMEMA Sales Review Clinic Management Meeting
Gantt Chart Enter Year Here Activities Jan Feb Mar Apr May Jun Jul Aug
Q1 Q2 Q3 Q4 PRODUCT ROADMAP TITLE Roadmap Tagline MILESTONE MILESTONE
Free PPT Diagrams : ALLPPT.com


Step 3 Step 2 Step 1 Put your text here Put your text here
Calendar Year 2009 Insure Oklahoma Total & Projected Enrollment
MONTH CYCLE BEGINS CYCLE ENDS DUE TO FINANCE JUL /2/2015
Jan Sun Mon Tue Wed Thu Fri Sat
2009 TIMELINE PROJECT PLANNING 12 Months Example text Jan Feb March
Lecture 4.1: Hash Functions: Introduction
The Birthday Paradox June 2012.

©G Dear 2008 – Not to be sold/Free to use
Electricity Cost and Use – FY 2016 and FY 2017

Safety Group Program Timeline
©G Dear 2010 – Not to be sold/Free to use
Unemployment in Today’s Economy
Arrival Performance Acute Myocardial Infarction Patients Receiving Aspirin Within 24 Hours of Hospital Arrival Percent Jul-03.
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Q1 Q2 Q3 Q4 PRODUCT ROADMAP TITLE Roadmap Tagline MILESTONE MILESTONE
Free PPT Diagrams : ALLPPT.com


Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Objective - To make a line graph.
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Text for section 1 1 Text for section 2 2 Text for section 3 3
Project timeline # 3 Step # 3 is about x, y and z # 2
Lecture 4: Hash Functions
TIMELINE NAME OF PROJECT Today 2016 Jan Feb Mar Apr May Jun
Safety Group Program Timeline

2009 TIMELINE PROJECT PLANNING 12 Months Example text Jan Feb March
Q1 Q2 Q3 Q4 PRODUCT ROADMAP TITLE Roadmap Tagline MILESTONE MILESTONE
Pilot of revised survey
Presentation transcript:

The Birthday Paradox July

Definition 2 Birthday attacks are a class of brute-force techniques that target the cryptographic hash functions. The goal is to take a cryptographic hash function and find two different inputs that produce the same output.

The Birthday Problem 3 What is the probability that at least two of k randomly selected people have the same birthday? (Same month and day, but not necessarily the same year.)

The Birthday Paradox 4 How large must k be so that the probability is greater than 50 percent? The answer is 23 It is a paradox in the sense that a mathematical truth contradicts common intuition.

Birthday paradox in our class 5  What’s the chances that two people in our class of 43 have the same birthday?  Approximate solution: Where k = 43 people, and N = 365 choices

Birthday Calendar Wall 6 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec  Equivalence to our hashing space

Calculating the Probability-1 7  Assumptions  Nobody was born on February 29  People's birthdays are equally distributed over the other 365 days of the year

Calculating the Probability-2 8  In a room of k people q: the prob. all people have different birthdays p : the prob. at least two of them have the same birthdays

Calculating the Probability-3 9  Shared Birthday Probabalities

Collision Search-1 10 The prob. that no collision is found after selecting k inputs is (In the case of the birthday paradox k is the number of people randomly selected and the collision condition is the birthday of the people and n=365.) For collision search, select distinct inputs x i for i=1, 2,..., n, where n is the number of hash bits and check for a collision in the h(x i ) values

Collision Search-2 11 For large n

Collision Search-3 12 When k is large, the percentage difference between k and k-1 is small, and we may approximate k-1  k.

Collision Search-4 13  For the birthday case, the value of k that makes the probability closest to 1/2 is 23

Attack Prevention 14 The important property is the length in bits of the message digest produced by the hash function. m should be large enough so that it’s not feasible to compute hash values!!! The 0.5 probability of collision for m bit hash, expected number of operation k before finding a collision is very close to If the number of m bit hash, the cardinality n of the hash function is

15 Q& A