scispace - formally typeset
Search or ask a question
Topic

Collision attack

About: Collision attack is a research topic. Over the lifetime, 1093 publications have been published within this topic receiving 28389 citations.


Papers
More filters
Proceedings ArticleDOI
02 Apr 2007
TL;DR: This paper analyzes OpenPGP and SSL/TLS protocols showing all the necessary changes to make the transition to a new hash function.
Abstract: MD5 and SHA-1 are the most common hash functions used in most security protocols and implementations. However, recent discoveries show that these hash functions are not secure as they should be, which necessitate the need for deploying a new hash function. This implies a number of changes for all major cryptographic protocols. This paper analyzes OpenPGP and SSL/TLS protocols showing all the necessary changes to make the transition to a new hash function

4 citations

Patent
Ilya Mironov1
14 Aug 2006
TL;DR: A message is hashed with a first hash function to generate a first hashed message, and then the message is then signed by using a second hash function as mentioned in this paper, such as a TCR (target-collision resistant) hash.
Abstract: A message is hashed with a first hash function to generate a first hashed message, and then the first hashed message is hashed with a second hash function to generate a second hashed message. The second hashed message is then signed. The first hash function may be a domain extender, such as a TCR (target-collision resistant) hash. The second hash function may be a random oracle. The second hash function may be slower than the first hash function. A signature scheme such as DSA, PSS-RSA, or Cramer-Shoup may be used.

4 citations

Book ChapterDOI
01 Jan 2003
TL;DR: The FSR-255 family hardware implementation is presented at the level of logical structure, and the circuit is designed for implementing as a full custom ASIC, and is optimized to increase the processing rate.
Abstract: In the paper a family of cryptographic hash functions with a variable length of hash result, called the FSR-255 family, is presented. The hash functions are defined by some processing structures based on seventeen 15-stage nonlinear feedback shift registers. The feedback functions can be modified by the user to customize the hash function. An algorithm for computing the hash result of length r≤255 is given. It was successfully tested against the birthday attack: no collisions have been found. The FSR-255 family hardware implementation is presented at the level of logical structure. The circuit is designed for implementing as a full custom ASIC, and is optimized to increase the processing rate. The device is capable of working on-line, and can be customized by the user.

4 citations

Journal ArticleDOI
TL;DR: It is believed that the proposed Omega Network Hash Construction (ONHC) run parallel in multi-core machine has been proposed as an alternative to the existing hash constructions and performed better than the Merkle-Damgard construction.
Abstract: Problem statement: Cryptographic hash functions are important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Most of the cryptographic hash functions are based on the Merkle-Damgard construction. The basic Merkle-Damgard construction runs over the input sequentially, which can lead to problems when the input size is large since the computation time increases linearly. Approach: Therefore, an alternative architecture which can reduce the computation time is needed, especially in today’s world where multi-core processors and multithreaded programming are common. An Omega Network Hash Construction (ONHC) run parallel in multi-core machine has been proposed as an alternative to the existing hash constructions. Result: The ONHC performed better than the Merkle-Damgard construction. ONHC permutation architecture also showed improved security strength in term of digest value randomness when compared to Merkle-Damgard construction. Conclusion: Therefore, it is believed that the proposed ONHC is a valuable structure that can improve the performance of any hash function that can run on top of it.

4 citations

Chen, Jie, Hu, Yupu, Zhang, Yueyu, Dong, Xiaoli 
01 Jan 2012

4 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
88% related
Public-key cryptography
27.2K papers, 547.7K citations
87% related
Hash function
31.5K papers, 538.5K citations
85% related
Encryption
98.3K papers, 1.4M citations
85% related
Computer security model
18.1K papers, 352.9K citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202311
202224
202115
202013
201919
201815