Page 556 - StudyBook.pdf
P. 556

540    Chapter 9 • Basis of Cryptography

             mathematical process used to obtain the hash value. Let’s take a quick look at the
             hashing algorithms you are likely to encounter on the Security+ exam:

                  ■   Message Digest 4/Message Digest 5 (MD4/MD5) The message
                      digest (MD) class of algorithms were developed by Ron Rivest for use
                      with digital signatures.They both have a fixed 128-bit hash length, but the
                      MD4 algorithm is flawed and the MD5 hash has been adopted as its
                      replacement.

                  ■   Secure Hash Algorithm (SHA) This hashing algorithm was created by
                      the U.S. government (NIST and the National Security Agency [NSA])
                      and operates similarly to the MD algorithms.The most common is SHA-
                      1, which is typically used in IPSec installations, and has a fixed hash length
                      of 160 bits.There are other forms of the SHA algorithm that have dif-
                      ferent hash lengths, but they are unlikely to be encountered on the
                      Security+ exam.

                Using MD5 for Data Integrity
           Tools and Traps…  a Trojan horse. The software itself was not trojaned, only the distribution
                A few years ago, MD5 sums were used to verify that a distribution of
                OpenSSH, the popular open source SSH software, had been infected with

                files. Because certain operating systems such as FreeBSD automatically
                check MD5 sums of downloaded source against known MD5 sums of
                what the package should be, the trojaned files were discovered and
                removed from the distribution source within six hours of the infection.






























          www.syngress.com
   551   552   553   554   555   556   557   558   559   560   561