搜索结果: 1-15 共查到“Collision Attack”相关记录32条 . 查询时间(0.109 秒)
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
hash function RIPEMD-160 freedom degree utilization
2019/6/10
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1. However, for RIPEMD-160, no (semi-free-start)...
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces
FCA full collision group collision attack
2019/1/9
Recovering keys efficiently from far beyond exhaustible candidate spaces is a meaningful but very challenging topic in Side-Channel Attacks (SCA). Recent methods often utilize collision optimizations ...
In this paper, we re-consider the connecting techniques to find colliding messages, which is achieved by connecting the middle part with the initial part. To obtain the best position of middle part, w...
In this paper, we propose a new cryptanalysis method to mount collision attack on RIPEMD-160. Firstly, we review two existent cryptanalysis methods to mount (semi-free-start) collision attack on MD-SH...
Fast Near Collision Attack on the Grain v1 Stream Cipher
Cryptanalysis Stream ciphers Grain
2018/2/9
Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks. In this ...
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
AES Side Channel Attacks
2017/11/13
Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that ex...
Hash functions have been among the most scrutinized cryptographic primitives in the previous decade, mainly due to the cryptanalysis breakthroughs on MD-SHA family and the NIST SHA3 competition that f...
In this article, we describe a novel collision attack for up to 5 rounds of the Gr鴖tl hash function. This significantly improves upon the best previously published results on 3 rounds. By using a ne...
An algorithm for MD5 single-block collision attack using high-performance computing cluster
hash functions MD5 computing cluster
2016/1/6
The parallel algorithm and its implementation for performing a single-block collision attack on
MD5 are described. The algorithm is implemented as MPI program based upon the source code of Dr Marc
S...
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
Sliced Biclique cryptanalysis hash functions collision attack
2016/1/3
In this work, we apply the sliced biclique cryptanalysis technique to show 8-round collision attack on a hash function H based on 4-branch, Type-2 Generalized Feistel Network (Type-2 GFN). This attack...
Fast Collision Attack on MD5
Hash Function MD5 Differential Cryptanalysis Collision Attack Single-Block Collision
2013/4/18
We presented the first single block collision attack on MD5 with complexity of $2^{47}$ MD5 compressions and posted the challenge for another completely new one in 2010. Last year, Stevens presented a...
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bosselaers and Preneel. There are two different and independent parallel lines called $line1$ operation and...
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256
Hash function Skein SHA-3
2012/3/29
The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designed based on the threefish block cipher and it only uses three primitive operations: modular addition, rotation ...
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
Shabal low-weight pseudo collision attack preimage attack guess-and-determine technique SHA-3 competition
2010/8/17
This paper studies two types of attacks on the hash function Shabal. The first attack is a low-weight pseudo collision attack on Shabal. Since a pseudo collision attack is trivial for Shabal, we focus...
Correlation-Enhanced Power Analysis Collision Attack
implementation Side Channel Analysis Collision Attack DPA Masking AES Hardware Implementation
2010/7/13
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further rese...