搜索结果: 1-10 共查到“密码学 HAS-160”相关记录10条 . 查询时间(0.142 秒)
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
hash function RIPEMD-160 freedom degree utilization
font style='font-size:12px;'>
2019/6/10
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1. However, for RIPEMD-160, no (semi-free-start)...
Efficient Collision Attack Frameworks for RIPEMD-160
RIPEMD-160 collision hash function
font style='font-size:12px;'>
2018/7/9
In this paper, we re-consider the connecting techniques to find colliding messages, which is achieved by connecting the middle part with the initial part. To obtain the best position of middle part, w...
Improved Collision Attack on Reduced RIPEMD-160
RIPEMD-160 collision hash function
font style='font-size:12px;'>
2018/5/28
In this paper, we propose a new cryptanalysis method to mount collision attack on RIPEMD-160. Firstly, we review two existent cryptanalysis methods to mount (semi-free-start) collision attack on MD-SH...
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160
RIPEMD-160 semi-free-start collision collision
font style='font-size:12px;'>
2017/8/29
In this paper, we propose an improved cryptanalysis of the double-branch hash function RIPEMD-160 standardized by ISO/IEC. Firstly, we show how to theoretically calculate the step differential probabi...
Improved Cryptanalysis of Reduced RIPEMD-160
semi-free-start collision compression function
font style='font-size:12px;'>
2014/3/7
In this article, we propose an improved cryptanalysis of the double-branch hash function standard RIPEMD-160. Using a carefully designed non-linear path search tool, we study the potential differentia...
A heuristic for finding compatible differential paths with application to HAS-160
akircanski at gmail com
font style='font-size:12px;'>
2014/3/12
The question of compatibility of differential paths plays a central role in second order collision attacks on hash functions. In this context, attacks typically proceed by starting from the middle and...
On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography
NIST Special Publication 800-57 Suite B Cryptography 80-bit security
font style='font-size:12px;'>
2009/8/18
Meeting the requirements of NIST’s new cryptographic standards means phasing
out usage of 1024-bit RSA and 160-bit elliptic curve cryptography (ECC) by the end of the
year 2010. This write-up commen...
Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode
differential cryptanalysis related-key rectangle attack HAS-160
font style='font-size:12px;'>
2009/7/14
In this paper we investigate the security of the encryption mode of the HAS-160 hash
function. HAS-160 is a Korean hash standard which is widely used in Korea’s industry. The structure
of HAS-160 is...
Colliding Message Pair for 53-Step HAS-160
cryptanalysis collision attack hash functions
font style='font-size:12px;'>
2008/12/19
We present a collision attack on the hash function HAS-160
reduced to 53-steps. The attack has a complexity of about 235 hash computations.
The attack is based on the work of Cho et al. presented at...
Stateful Public-Key Cryptosystems:How to Encrypt with One 160-bit Exponentiation
Public-Key Cryptosystems Encrypt 160-bit Exponentiation
font style='font-size:12px;'>
2008/12/10
We show how to significantly speed-up the encryption portion of some public-key cryptosystems
by the simple expedient of allowing a sender to maintain state that is re-used across
different encrypti...