crypto overview - rgnet · 2017-02-19 · • cryptanalysis is the art of code breaking •...

47
Crypto Overview APRICOT / Thành phHChí Minh 2017.02.20 Thanks to Steve Bellovin & Sheryl Hermoso 1-2-1 Crypto 1 Creative Commons: Attribution & Share Alike

Upload: others

Post on 10-Mar-2020

15 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Crypto OverviewAPRICOT / Thành phố Hồ Chí Minh

2017.02.20

Thanks to Steve Bellovin & Sheryl Hermoso

1-2-1 Crypto 1Creative Commons: Attribution & Share Alike

Page 2: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Overview

• What is Cryptography?

• Symmetric Key Cryptography

• Asymmetric Key Cryptography

• Block and Stream Cipher

• Digital Signature and Message Digest

1-2-1 Crypto 2Creative Commons: Attribution & Share Alike

Page 3: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Cryptography is Old

1-2-1 Crypto 3Creative Commons: Attribution & Share Alike

German Lorenz cipher machine

Page 4: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

No, Older

Try Roman Times

1-2-1 Crypto 4Creative Commons: Attribution & Share Alike

Page 5: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Cryptography• Cryptography is the art of sending

private messages secretly over public communication channels

• Cryptanalysis is the art of code breaking• Encryption is a function of plaintext and

a cryptographic key

1-2-1 Crypto 5Creative Commons: Attribution & Share Alike

C = F(P,k)Notation:

Ciphertext (C)CryptoFunction (F)Plaintext (P)Cryptographic Key (k)

Page 6: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Encryption & Decryption

1-2-1 Crypto 6Creative Commons: Attribution & Share Alike

Plaintext

ENCRYPTIONALGORITHM

DECRYPTIONALGORITHM

Ciphertext Plaintext

Encryption Key Decryption Key

Page 7: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Codes• Not really encryption, but compression• Telegraph used to charge by the word• So you and I would have a codebook

aabbd – shipment has been sent

ljhtc – i arrive tomorrow by car

ljhdw – i will arrive wednesday

adfhd – when you receive the

shipment, call head office

1-2-1 Crypto 7Creative Commons: Attribution & Share Alike

Page 8: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Typical Scenario• Alice wants to send a “secret” message

to Bob• What are the possible problems?

• Data can be intercepted

• What are the ways to intercept this message?

• How to conceal the message?• Encryption

• 1-2-1 Crypto • 8• Creative Commons: Attribution & Share Alike

Page 9: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Crypto CoreSecure key establishment

Secure communication

1-2-1 Crypto 9Creative Commons: Attribution & Share Alike

Alice has key (k) Bob has key (k)

Alice has key (k) Bob has key (k)

mmmConfidentiality and integrity

Page 10: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Crypto Can Do More• Digital Signatures• Anonymous communication• Anonymous digital cash

• Spending a digital coin without anyone knowing my identity

• Buy online anonymously?• Elections and private auctions

• Finding the winner without actually knowing individual votes (privacy)

1-2-1 Crypto 10Creative Commons: Attribution & Share Alike

Page 11: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Magic TricksPrivately outsourcing computation

Zero knowledge (proof of knowledge)

1-2-1 Crypto 11Creative Commons: Attribution & Share Alike

Alice with search query

Google

E(query)

E(results)

What did she search

for?

I know the factorial of N Bob

I know the factorial of N

Proof

Source: Dan Boneh, Stanford

Page 12: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

History: Ciphers• Substitution ciphers

• involve replacing an alphabet with another character of the same alphabet set

• Can be mono-alphabetic (single set for substitution) or poly-alphabetic system (multiple alphabetic sets)

• Example: • Caesar cipher, a mono-alphabetic system in which

each character is replaced by the third character in succession

• Vigenere cipher, a poly-alphabetic cipher that uses a 26x26 table of characters

1-2-1 Crypto 12Creative Commons: Attribution & Share Alike

Page 13: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Caesar Cypher

1-2-1 Crypto 13Creative Commons: Attribution & Share Alike

ABCDEFGHIJKLMNOPQRSTUVWXYZDEFGHIJKLMNOPQRSTUVWXYZABC

HELLOKHOOR

➠➠ ➠ ➠

Plaintext or Cleartext

Encrypted Text

➠➠ ➠ ➠

Page 14: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Transposition Cipher• No letters are replaced, they are just

rearranged.• Rail Fence Cipher – a transposition

cipher in which the words are spelled out as if they were a rail fence.

1-2-1 Crypto 14Creative Commons: Attribution & Share Alike

Page 15: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

History: Rotor Machines (1870-1943)

Hebern machine – single rotor

Enigma - 3-5 rotors

1-2-1 Crypto 15Creative Commons: Attribution & Share Alike

Source: Wikipedia (image)

Page 16: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Kerckhoff’s Law (1883)• The system must not be required to be

secret, and it must be able to fall into the hands of the enemy without inconvenience.

• In other words, the security of the system must rest entirely on the secrecy of the key.

1-2-1 Crypto 16Creative Commons: Attribution & Share Alike

This is Critical

Page 17: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Modern Crypto Algorithms• Specify the mathematical transformation

that is performed on data to encrypt/decrypt

• Crypto algorithm is NOT secret, keys are

• Analyzed by public community to show that there are no serious weaknesses

• Explicitly designed for encryption1-2-1 Crypto 17Creative Commons: Attribution & Share Alike

Page 18: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Properties of Good Crypto• There should be no way short of

enumerating all possible keys to find the key from any amount of ciphertext and plaintext, nor any way to produce plaintext from ciphertext without the key.

• Enumerating all possible keys must be infeasible.

• The ciphertext must be indistinguishable from true random values.

1-2-1 Crypto 18Creative Commons: Attribution & Share Alike

Page 19: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Encryption• Process of transforming plaintext to

ciphertext using a cryptographic key• Used all around us

• In Application Layer – used in secure email, database sessions, and messaging

• In session layer – using Secure Socket Layer (SSL) or Transport Layer Security (TLS)

• In the Network Layer – using protocols such as SSH, VPNs, …

1-2-1 Crypto 19Creative Commons: Attribution & Share Alike

Page 20: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

If they outlawed encryption

You could not shop or bank over the Internet

1-2-1 Crypto 20Creative Commons: Attribution & Share Alike

Page 21: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Backdoor or Golden Key

Giving a key to the idiots who allowed the OPM hack, the biggest intelligence failure in

human history

1-2-1 Crypto 21Creative Commons: Attribution & Share Alike

Page 22: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Good Algorithms• Resistant to cryptographic attack

• Support variable and long key lengths and scalability

• Create an avalanche effect

• No export or import restrictions1-2-1 Crypto 22Creative Commons: Attribution & Share Alike

Page 23: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Avalanche Effect

If the cleartext changes the smallest amount, the ciphertext changes a lot

Wikipedia, the source of all knowledge Jwhen an input is changed slightly (for example, flipping a single bit) the output changes significantly (e.g., half the output bits flip)

1-2-1 Crypto 23Creative Commons: Attribution & Share Alike

Page 24: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Encryption & Decryption

1-2-1 Crypto 24Creative Commons: Attribution & Share Alike

Plaintext

ENCRYPTIONALGORITHM

DECRYPTIONALGORITHM

Ciphertext Plaintext

Encryption Key Decryption Key

Page 25: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Symmetric Encryption

1-2-1 Crypto 25Creative Commons: Attribution & Share Alike

Plaintext

ENCRYPTIONALGORITHM

DECRYPTIONALGORITHM

Ciphertext Plaintext

Encryption Key Decryption Key

Same shared secret key

Shared Key Shared Key Symmetric Key Cryptography

Page 26: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Symmetric Key Algorithms• Same key to both encrypt and decrypt• Also known as a secret-key algorithm

• The key must be kept a “secret” to maintain security• This key is also known as a private key

• Follows the more traditional form of cryptography with key lengths ranging from 40 to 256 bits.

• Examples:• DES, 3DES, AES, RC4, RC6, Blowfish

1-2-1 Crypto 26Creative Commons: Attribution & Share Alike

Page 27: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Block Cipher• Transforms a fixed-length block of plain text into a

block of ciphertext• operates on a pre-determined block of bits (one byte,

one word, 512 bytes, so forth), mixing key data in with the message data in a variety of different ways

• Common block ciphers:• DES and 3DES (in ECB and CBC mode)• Skipjack• Blowfish• RSA• AES• IDEA• SAFER

1-2-1 Crypto 27Creative Commons: Attribution & Share Alike

Page 28: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Stream Cipher• Smaller units of plaintext than block ciphers.

• Typically bit-wise• Performs some operation (typically an exclusive OR) with

one of these key bits and one of the message bits

• Either has a very long key (that eventually repeats) or a reusable key that generates a repeatable but seemingly random string of bits.

• Common stream ciphers:• ChaCha• DES and 3DES (running OFB or CFB mode)• SEAL

1-2-1 Crypto 28Creative Commons: Attribution & Share Alike

Page 29: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Data Encryption Standard (DES)

• Developed by IBM for the US government in 1973-1974, and approved in Nov 1976.

• Based on Horst Feistel’s Lucifer cipher• Block cipher using shared key encryption,

56-bit key length• An archetypal block cipher with block size

of 64 bits• Now considered as insecure

1-2-1 Crypto 29Creative Commons: Attribution & Share Alike

Page 30: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

DES: Illustration

1-2-1 Crypto 30Creative Commons: Attribution & Share Alike

Plaintext

ENCRYPTIONALGORITHM

DECRYPTIONALGORITHM

Ciphertext Plaintext

Encryption Key Decryption Key

56-bit keys + 8 bits parity

64-bit blocks of input text

Page 31: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

DES is Broken• Developed in the early 1970s• The 56-bit key length is too short for

modern computatation• Broken in 22 hours in 1999, but known to

be vulnerable earlier• So it lasted 25 years, OK for early days• But messages encrypted with DES in

1990 can be read now trivially!!!1-2-1 Crypto 31Creative Commons: Attribution & Share Alike

Page 32: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Triple DES-peration• 3DES (Triple DES) – a block cipher that

applies DES three times to each data block• Uses a key bundle comprising of three DES

keys (K1, K2, K3), each with 56 bits excluding parity

• DES encrypts with K1, decrypts with K2, then encrypts with K3

• Disadvantage: very slow

1-2-1 Crypto 32Creative Commons: Attribution & Share Alike

Ci = EK3(DK 2 (EK1(Pi )))

Page 33: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

3DES: Illustration

Creative Commons: Attribution & Share Alike 33

Note:If Key1 = Key2 = Key3, this is similar to DESUsually, Key1 = Key3

Plaintext

ENCRYPT

Ciphertext

Key 1

DECRYPT ENCRYPT

Key 2 Key 3

Page 34: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Advanced Encryption Standard (AES)

• NIST/NSA held a contest• Published in November 2001• Symmetric block cipher• Has a fixed block size of 128 bits• Has a key size of 128, 192, or 256 bits• Based on Rijndael cipher which was developed

by Joan Daemen and Vincent Rijmen• Better suited for high-throughput, low latency

environments1-2-1 Crypto 34Creative Commons: Attribution & Share Alike

Page 35: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Rivest Cipher

RC Algorithm DescriptionRC2 Variable key-sized cipher used as a drop in replacement

for DESRC4 Variable key sized stream cipher; Often used in file

encryption and secure communications (SSL) RC5 Variable block size and variable key length; uses 64-bit

block size; Fast, replacement for DESRC6 Block cipher based on RC5, meets AES requirement

Creative Commons: Attribution & Share Alike 35

Chosen for speed and variable-key length capabilities

Designed mostly by Ronald RivestEach of the algorithms have different uses

Page 36: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Symmetric Key AlgsSymmetric Algorithm Key SizeDES 56-bit keysTriple DES (3DES) 112-bit and 168-bit keysAES 128, 192, and 256-bit keysIDEA 128-bit keysRC2 40 and 64-bit keysRC4 1 to 256-bit keysRC5 0 to 2040-bit keysRC6 128, 192, and 256-bit keysBlowfish 32 to 448-bit keys

1-2-1 Crypto 36Creative Commons: Attribution & Share Alike

Note: Longer keys are more difficult to crack, but more computationally expensive.

Page 37: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Asymmetric Key Algs• Also called public-key cryptography

• Keep private key to yourself and protected

• Send/share the public key to anyone• Separate keys for encryption and decryption

(public and private key pairs)• Examples:

• RSA, DSA, Diffie-Hellman, ElGamal, PKCS

1-2-1 Crypto 37Creative Commons: Attribution & Share Alike

Page 38: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Public Key EncryptionUses public/private keys

– One key is mathematical inverse of the other– Private key is only known by owner of the pair– Public keys are stored in public servers

Private Public

Computing Key pair is computationally expensive!!Common Algorithms: RSA, El Gamal, DSS, ECC

381-2-1 Crypto Creative Commons: Attribution & Share Alike

Page 39: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Asymmetric Encryption

1-2-1 Crypto 39Creative Commons: Attribution & Share Alike

Plaintext

ENCRYPTIONALGORITHM

DECRYPTIONALGORITHM

Ciphertext Plaintext

Encryption Key Decryption Key

Public Key Private Key Asymmetric Key Cryptography

Different keysPublished by Receiver

Page 40: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Asymmetric Key Algorithms• RSA – the first and still most common

implementation (Rivest, Shamir, Adelman)• DSA – specified in NIST’s Digital Signature

Standard (DSS), provides digital signature capability for authentication of messages

• Diffie-Hellman – used for secret key exchange only, and not for authentication or digital signature

• ElGamal – similar to Diffie-Hellman and used for key exchange

• PKCS – an overly complex set of interoperable standards and guidelines

1-2-1 Crypto 40Creative Commons: Attribution & Share Alike

Page 41: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Symmetric vs. Asymmetric Key

Symmetric AsymmetricGenerally fast Same key for both encryption and decryption

Can be 1000 times slowerUses two different keys (public and private)Decryption key cannot be calculated from the encryption keyKey lengths: 512 to 4096 bitsUsed in low-volume

1-2-1 Crypto 41Creative Commons: Attribution & Share Alike

Mostly used in combination

Page 42: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Hash Functions• Produce a condensed representation of a text (hashing)• The fixed-length output called the hash or message digest• Hash function takes an input message of arbitrary length

and outputs fixed-length code. • Given x, we can compute the value f(x).• Given f(x), it is extremely hard to get the value of x.

• If it uniquely represents the data, it is Collision-free• Uses:

• Verifying file integrity - if the hash changes, it means the data is either compromised or altered in transit.

• Digitally signing documents• Hashing passwords

1-2-1 Crypto 42Creative Commons: Attribution & Share Alike

Page 43: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Hash Functions• Message Digest (MD) Algorithm

• Outputs a 128-bit fingerprint of an arbitrary-length input• MD4 is obsolete, MD5 is widely-used

• Secure Hash Algorithm (SHA)• SHA-1 produces a 160-bit message digest similar to MD5• Widely-used on security applications (TLS, SSL, PGP, SSH,

S/MIME, IPsec)• SHA-256, SHA-384, SHA-512 are also commonly used, which

can produce hash values that are 256, 384, and 512-bits respectively

• RIPEMD• Derived from MD4, but performs like SHA• RIPEMD-160 is the most popular version

1-2-1 Crypto 43Creative Commons: Attribution & Share Alike

Page 44: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Digital Signature• A digital signature is a message appended

to a packet• The sender encrypts message with their

private key instead of encrypting with intended receiver’s public key

• The receiver of the packet uses the sender’s public key to verify the signature.

• Used to prove the identity of the sender and the integrity of the message

1-2-1 Crypto 44Creative Commons: Attribution & Share Alike

Page 45: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Digital Signature• Two common public-key digital signature

techniques:• RSA (Rivest, Shamir, Adelman)• DSS (Digital Signature Standard)

• Used in a lot of things:• Email, software distribution, electronic funds

transfer, etc• A common way to implement is to use a

hashing algorithm to get the message digest of the data, then use an algorithm to sign the message

1-2-1 Crypto 45Creative Commons: Attribution & Share Alike

Page 46: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Digital Signing Process1. Hash the data using one of the supported hashing

algorithms (MD5, SHA-1, SHA-256)2. Encrypt the hashed data using the sender’s private key3. Append the signature (and a copy of the sender’s public key)

to the end of the data that was signed)

Creative Commons: Attribution & Share Alike 46

DATAHASH

(DATA)DIGITAL

SIGNATURE

MD5/SHA-x PRIVATE KEY

Page 47: Crypto Overview - RGnet · 2017-02-19 · • Cryptanalysis is the art of code breaking • Encryption is a function of plaintext and ... • Rail Fence Cipher – a transposition

Signature Verification1. Hash the original data using the same hashing algorithm2. Decrypt the digital signature using the sender’s public key. All

digital signatures contain a copy of the signer’s public key3. Compare the results of the hashing and the decryption. If the

values match then the signature is verified. If the values do not match, then the data or signature was probably modified.

Creative Commons: Attribution & Share Alike 47

DATA

Decrypt

HASH (DATA)

HASH (DIGITAL

SIG)

MD5/SHA-x

MATCH?