scispace - formally typeset
Proceedings ArticleDOI

On the Security of VSH in Password Schemes

Reads0
Chats0
TLDR
This paper improves Saarinen's method for finding preimages of very smooth hash (VSH) hash values and generalise it to some of the variants of VSH proposed by Contini et al.
Abstract
In this paper we improve Saarinen's method for finding preimages of very smooth hash (VSH) hash values and generalise it to some of the variants of VSH proposed by Contini et al. VSH is a new hash function that has been proved to be collision resistant under similar assumptions on the factoring of large integers as the RSA cipher. Saarinen has developed a method for finding preimages of VSH hash values and in his paper he gave an example of its application to 169-bit VSH and 4-character passwords consisting of lowercase alphabets. Because there were no results on the practical effectiveness of this approach with cryptographically significant security parameters, we give some results on the time and memory required to find the preimages of 8-character alphanumeric passwords secured by 1024-bit and 2048-bit VSH on quite modest hardware. In our study we implemented both the original VSH and the cubing variant of VSH. Our results show that both Saarinen's method and our method can find preimages of password hash values very quickly and that our method is faster in many cases. Our method also uses reusable tables that can be used to find the preimages of subsequent hash values faster than with the original method.

read more

Citations
More filters

Hash function security : cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions

Kimmo Halunen
TL;DR: An improved method for finding preimages of Very Smooth Hash is developed, compare this method with existing methods and demonstrate its efficiency with practical results, and the methods for finding multicollisions in traditional iterated hash functions are described.
Book ChapterDOI

Preimage attacks against variants of very smooth hash

TL;DR: It is shown that some new variants of the Very Smooth Hash (VSH) hash function are susceptible to similar types of preimage attacks as the original VSH and they result in effective pre image attacks.
Journal Article

Breaking the ICE : Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions

TL;DR: In this paper, the authors consider the general case and prove that even if each iterated hash function can scan the input multiple times in an arbitrary expanded order, their concatenation is not stronger than a single function.
Proceedings ArticleDOI

Finding Preimages of Multiple Passwords Secured with VSH

TL;DR: This paper presents an improvement to the preimage attacks on Very Smooth Hash (VSH) function, and argues that the methods presented previously and the method are essentially the only significantly different methods derivable from Saarinen's work.
Book ChapterDOI

Enhanced VSDL Hash Algorithm for Data Integrity and Protection

TL;DR: Modified VSDL hash algorithm is proposed which provides data integrity and provides 2% better results compared with the existing algorithms.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book ChapterDOI

A Certified Digital Signature

TL;DR: A practical digital signature system based on a conventionalryption function which is as secure as the conventional encryption function is described, without the several years delay required for certification of an untested system.
Book ChapterDOI

Finding collisions in the full SHA-1

TL;DR: This is the first attack on the full 80-step SHA-1 with complexity less than the 280 theoretical bound, and it is shown that collisions ofSHA-1 can be found with complexityLess than 269 hash operations.
Book ChapterDOI

How to break MD5 and other hash functions

TL;DR: A new powerful attack on MD5 is presented, which unlike most differential attacks, does not use the exclusive-or as a measure of difference, but instead uses modular integer subtraction as the measure.
Book ChapterDOI

A design principle for hash functions

Ivan Damgård
TL;DR: Apart from suggesting a generally sound design principle for hash functions, the results give a unified view of several apparently unrelated constructions of hash functions proposed earlier, and suggests changes to other proposed constructions to make a proof of security potentially easier.