home | articles | links | fun | about
Up to: CS432 Information Security

Data Integrity (9/17/02)

Detect tampering

Ignore confidentiality, availability for now, discussed later.

Example: 100 GB data, can read/write anywhere, want to detect tampering anywhere

Physical security

Checksums/hashes

Better: cryptographic hash

Properties of hashes

Are hashes irreversible? We don't know. So far, have been difficult to crack.

SHA-1 Hash Function

Final 100GB secure storage solution

Have a 20 byte hash (160 bits, output of SHA-1) over 1024 bytes of data (roughly, 50 times compression)

Then, repeat trick. Have a 20 byte hash for groups of hashes (another 50x compression). Eventually, get a 20 byte hash over ALL the hashes. Just secure this.

To update: recompute hash over 1k

Why 1k? If over a huge amount (100k) then tree very shallow. Takes a long time to recompute hash if simple change was made.

Why not less than 1k? If too low, tree very deep (not much compression). End up wasting a lot of space storing hashes.

Result:

Themes in cryptography