Finding collisions in the full SHA-1
Xiaoyun Wang,Yiqun Lisa Yin,Hongbo Yu +2 more
- pp 17-36
Reads0
Chats0
TLDR
This is the first attack on the full 80-step SHA-1 with complexity less than the 280 theoretical bound, and it is shown that collisions ofSHA-1 can be found with complexityLess than 269 hash operations.Abstract:
In this paper, we present new collision search attacks on the hash function SHA-1. We show that collisions of SHA-1 can be found with complexity less than 269 hash operations. This is the first attack on the full 80-step SHA-1 with complexity less than the 280 theoretical bound.read more
Citations
More filters
Journal ArticleDOI
Ash-512
TL;DR: 'Algorithm for Secure Hashing-512' (ASH-512) is a novel algorithm proposed in this paper, which is designed using co-ordinate geometric concepts and the results are compared with standard cryptographic hash algorithm-SHA2 (512) and Whirlpool-512.
Journal ArticleDOI
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures
TL;DR: This work introduces two new types of group access structures called D-HOFC and Top-Down Homomorphic One-way Function Tree (TD-HOFT), which can be regarded as dynamic counterparts of DHC and BHT.
Book ChapterDOI
Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning
TL;DR: A new authentication and localisation scheme to produce a watermark which can be embedded in a limited capacity binary text document and that will work in a print and scan environment using Message Authentication Codes (MAC), specifically OMACs.
Book ChapterDOI
Hash-Chain Based Authentication for IoT Devices and REST Web-Services
António Pinto,Ricardo Costa +1 more
TL;DR: This work proposes a modified hash-chain authentication mechanism that, with the help of a smart-phone, can authenticate each interaction of the devices with a REST web-service using One Time Passwords (OTP).
Book ChapterDOI
Analysis of message injection in stream cipher-based hash functions
TL;DR: This paper describes two types of message injection functions, which may be appended to the keystream generator to build an SCH, and evaluates the security of simple SCHs whose stream cipher function consists of a LFSR-based filter generator.
References
More filters
Book ChapterDOI
How to break MD5 and other hash functions
Xiaoyun Wang,Hongbo Yu +1 more
TL;DR: A new powerful attack on MD5 is presented, which unlike most differential attacks, does not use the exclusive-or as a measure of difference, but instead uses modular integer subtraction as the measure.
Journal Article
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques
TL;DR: This paper discusses Cryptography in High Dimensional Tori, a Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers, and reducing Complexity Assumptions for Statistically-Hiding Commitment.
BookDOI
Advances in Cryptology – CRYPTO 2004
TL;DR: A formal statistical framework for block cipher attacks based on this technique is developed and explicit and compact gain formulas for generalized versions of Matsui’s Algorithm 1 and Algorithm 2 are derived.