3.6 KiB
Try not to look at these answers, unless you really have too ..
Introduction
1
Sample run with Firefox on Mac OSX
RSA 1,024 161 ms RSA 2,048 924 ms ECC 128-bit 34 ms ECC 160-bit 43 ms ECC 256-bit 27 ms
What can you observe about the performance of the key pair generation?
RSA increases greatly with an increasing key size, but ECC is fairly constant.
3.
Function Word to hash Result from your Web page (first two hex characters) Test using Python [see code below](first two hex characters) Prove with Openssl
MD5 “Hello” 8b1a9953c4611296a827abf8c47804d7
SHA1 “Hello” f7ff9e8b7bb2e09b70935a5d785e0cc5d9d0abf0
SHA256 “Hello” 185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969
SHA3 “Hello” 06b3dfaec148fb1bb2b066f10ec285e7c9bf402ab32aa78a5d38e34566810cd2
RIPEMD “Hello” d44426aca8ae0a69cdbc4021c64fa5ad68ca32fe
PBKDF2 256-bit “Hello” 2071f2b297b8373d87489ffa202fe92aef0e710e799af3119d6c44fd8402d463
apieraccount@ubuntu:~$ echo -n Hello | openssl md5 (stdin)= 8b1a9953c4611296a827abf8c47804d7 napieraccount@ubuntu:~$ echo -n Hello | openssl sha1 (stdin)= f7ff9e8b7bb2e09b70935a5d785e0cc5d9d0abf0 napieraccount@ubuntu:~$ echo -n Hello | openssl sha256 (stdin)= 185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969 napieraccount@ubuntu:~$ echo -n Hello | openssl sha1 -ripemd160 (stdin)= d44426aca8ae0a69cdbc4021c64fa5ad68ca32fe
A sample run from the Python code is:
napieraccount@ubuntu:~$ python f.py General Hashes MD5:8b1a9953c4611296a827abf8c47804d7 SHA1:f7ff9e8b7bb2e09b70935a5d785e0cc5d9d0abf0 SHA256:185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969 SHA512:3615f80c9d293ed7402687f94b22d58e529b8cc7916f8fac7fddf7fbd5af4cf777d3d795a7a00a16bf7e7f3fb9561ee9baae480da9fe7a18769e71886b03f315
For PBKDF2:
napieraccount@ubuntu:~$ python g.py Salt is C3KthONMn8IY3JK8E0Y/0w== PBKDF2 (SHA1):$pbkdf2$1000$C3KthONMn8IY3JK8E0Y/0w$KDpgt4.NFrl.WBzjAsWXJ/T0Kgk PBKDF2 (SHA256):$pbkdf2-sha256$1000$C3KthONMn8IY3JK8E0Y/0w$ZQaitGxMChAxH.aFdG/WMquvQjigz8EIlDB6jUyKa3w
4.
napieraccount@ubuntu:~$ echo -n Hello | openssl md5 -hmac qwerty (stdin)= 7f43007a026d9696566dc8c7bb2172e4 napieraccount@ubuntu:~$ echo -n Hello | openssl sha1 -hmac qwerty (stdin)= 8c7cd4cb162bc91e4ee4573aba50ca00474e7c5d napieraccount@ubuntu:~$ echo -n Hello | openssl sha256 -hmac qwerty (stdin)= c51283c48610dd9b433ce4bf9e7b0b44b808f98bb056fca45953101b1d8fc973
For HMAC:
napieraccount@ubuntu:~$ cat 1.js
var crypto = require('crypto');
var key = 'qwerty';
var message = 'Hello';
var hash = crypto.createHmac('md5', key).update(message);
console.log(hash.digest('hex'));
console.log(hash.digest('base64'));
napieraccount@ubuntu:~$ node 1.js
7f43007a026d9696566dc8c7bb2172e4
5.
napieraccount@ubuntu:~$ echo -n Hello | openssl enc -aes-256-cbc -pass pass:"qwerty" -e -base64 -S 241fa86763b85341 U2FsdGVkX18kH6hnY7hTQZAGxV2faF01w6uhO+X6+9Q=
napieraccount@ubuntu:~$ echo -n Hello | openssl enc -aes-256-cbc -pass pass:"qwerty" -e -S 241fa86763b85341 Salted__$<1F>gc<67>SA<53><06>]<5D>h]5ë<35>;<3B><><EFBFBD><EFBFBD>
We can see the word "Salted__".
When we convert we get:
(53 61 6C 74 65 64 5F 5F 24) (1F A8 67 63 B8 53 41 90) (06C55D9F685D35C3ABA13BE5FAFBD4)
The format is (signature "Salted__"), (Salt), and (Cipher).
For encryption/decryption:
napieraccount@ubuntu:~$ cat enc.txt U2FsdGVkX18kH6hnY7hTQZAGxV2faF01w6uhO+X6+9Q= napieraccount@ubuntu:~$ openssl enc -aes-256-cbc -pass pass:"qwerty" -d -base64 -S 241fa86763b85341 -in enc.txt -out out.txt napieraccount@ubuntu:~$ cat out.txt Hello