This is an old revision of the document!


Lab 09 - OpenSSL MACs and Hashing

Exercise 1

In this first exercise we'll see how to compute hashes using the OpenSSL command line interface.

You can interact with the OpenSSL utilities in two ways:

  • directly from bash, by using the openssl command followed by the desired command and parameters
  • from the OpenSSL console, by using the openssl command without additional arguments. You can close the console by calling quit or exit.

If the manual pages are correctly installed, you can consult the documentation via man <command_name> (e.g. man md5).

Hashes are often used to check the integrity of downloaded files. We will now use OpenSSL to compute the MD5 and SHA-1 hashes of this page.

Download this page by running:

linux$ wget http://ocw.cs.pub.ro/courses/sasc/laboratoare/09

Use OpenSSL to compute the MD5 and SHA-1 hashes of the newly downloaded file; print the output in hexadecimal.

To check your results, you can use md5sum or sha1sum as an alternative way of computing the same hashes.

Exercise 2

Exercise 3

In this exercise you will implement the Birthday attack on SHA-1 from the previous lab using OpenSSL. The goal is to obtain a collision in the first four bytes of the hash.

You can implement the attack from scratch, or start from our archive here.

To compute a digest, you might find the code below useful:

    SHA_CTX context;
    SHA1_Init(&context);
    SHA1_Update(&context, buffer, length);
    SHA1_Final(md, &context); /* md must point to at least 20 bytes of valid memory */
sasc/laboratoare/09.1462185421.txt.gz · Last modified: 2016/05/02 13:37 by sergiu.costea
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0