International Conference on Mathematics and Natural Sciences 2008 Institut Teknologi , 2008-10-28

Title : ( A Survey on How to Break Hash Functions )

Authors: B. Pahlevanzadeh , Seyed Amin Hosseini Seno , T.C Wan , R. Budiarto ,

Access to full-text not allowed by authors

Citation: BibTeX | EndNote

Abstract

With the development of hash functions family, there has also been security analysis on these functions and thereupon there have been several important cryptanalytic results for them. One of the novel approaches in this area is by Wang, Feng, Lai and Yu which proposed to break hash function family using a kind of precise modular differential attack, which unlike most differential attack uses the difference in term of integer modular subtraction and had efficiently find collisions of MD4 in less than a fraction of a second and about 15 minutes up to an hour computation time for MD5. This attack is applicable to other hash functions. Our focusing is on survey of this new model in compared with previous approaches in this area.

Keywords

, hash functions . security, attack
برای دانلود از شناسه و رمز عبور پرتال پویا استفاده کنید.

@inproceedings{paperid:1024878,
author = {B. Pahlevanzadeh and Hosseini Seno, Seyed Amin and T.C Wan and R. Budiarto},
title = {A Survey on How to Break Hash Functions},
booktitle = {International Conference on Mathematics and Natural Sciences 2008 Institut Teknologi},
year = {2008},
location = {بندانگ},
keywords = {hash functions . security; attack},
}

[Download]

%0 Conference Proceedings
%T A Survey on How to Break Hash Functions
%A B. Pahlevanzadeh
%A Hosseini Seno, Seyed Amin
%A T.C Wan
%A R. Budiarto
%J International Conference on Mathematics and Natural Sciences 2008 Institut Teknologi
%D 2008

[Download]