WebSite Logo
  • Content
  • Similar Resources
  • Metadata
  • Cite This
  • Language
    অসমীয়া বাংলা भोजपुरी डोगरी English ગુજરાતી हिंदी ಕನ್ನಡ
    Khasi कोंकणी मैथिली മലയാളം ꯃꯤꯇꯩ ꯂꯣꯟ मराठी Mizo नेपाली
    ଓଡ଼ିଆ ਪੰਜਾਬੀ संस्कृत ᱥᱟᱱᱛᱟᱲᱤ सिन्धी தமிழ் తెలుగు اردو
  • Log-in
  • Fullscreen
Log-in
Do not have an account? Register Now
Forgot your password? Account recovery
  1. International Journal of Information Security
  2. International Journal of Information Security : Volume 9
  3. International Journal of Information Security : Volume 9, Issue 2, April 2010
  4. On hash functions using checksums
Loading...

Please wait, while we are loading the content...

International Journal of Information Security : Volume 16
International Journal of Information Security : Volume 15
International Journal of Information Security : Volume 14
International Journal of Information Security : Volume 13
International Journal of Information Security : Volume 12
International Journal of Information Security : Volume 11
International Journal of Information Security : Volume 10
International Journal of Information Security : Volume 9
International Journal of Information Security : Volume 9, Issue 6, December 2010
International Journal of Information Security : Volume 9, Issue 5, October 2010
International Journal of Information Security : Volume 9, Issue 4, August 2010
International Journal of Information Security : Volume 9, Issue 3, June 2010
International Journal of Information Security : Volume 9, Issue 2, April 2010
The principle of guarantee availability for security protocol analysis
Formal validation of automated policy refinement in the management of network security systems
Counting equations in algebraic attacks on block ciphers
On hash functions using checksums
International Journal of Information Security : Volume 9, Issue 1, February 2010
International Journal of Information Security : Volume 8
International Journal of Information Security : Volume 7
International Journal of Information Security : Volume 6
International Journal of Information Security : Volume 5
International Journal of Information Security : Volume 4
International Journal of Information Security : Volume 3
International Journal of Information Security : Volume 2
International Journal of Information Security : Volume 1

Similar Documents

...
The parazoa family: generalizing the sponge hash functions

Article

...
Generic constructions for role-based encryption

Article

...
On security arguments of the second round SHA-3 candidates

Article

...
Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions

Article

...
Improving cache attacks by considering cipher structure

Article

...
Hybrid authentication based on noisy channels

Article

...
On the security of the WinRAR encryption feature

Article

...
Sufficient conditions for sound tree and sequential hashing modes

Article

...
Certificate revocation system implementation based on the Merkle hash tree

Article

On hash functions using checksums

Content Provider Springer Nature Link
Author Gauravaram, Praveen Kelsey, John Knudsen, Lars R. Thomsen, Søren S.
Copyright Year 2009
Abstract We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto’04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least 226 and 254, respectively. Our herding and multicollision attacks on the hash functions based on generic checksum functions (e.g., one-way) are a special case of the attacks on the cascaded iterated hash functions previously analysed by Dunkelman and Preneel and are not better than their attacks. On hash functions with easily invertible checksums, our multicollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman and Preneel.
Starting Page 137
Ending Page 151
Page Count 15
File Format PDF
ISSN 16155262
Journal International Journal of Information Security
Volume Number 9
Issue Number 2
e-ISSN 16155270
Language English
Publisher Springer-Verlag
Publisher Date 2009-12-31
Publisher Place Berlin, Heidelberg
Access Restriction One Nation One Subscription (ONOS)
Subject Keyword Iterated hash functions Checksums Generic attacks Communications Engineering, Networks Management of Computing and Information Systems Coding and Information Theory Operating Systems Computer Communication Networks Data Encryption
Content Type Text
Resource Type Article
Subject Computer Networks and Communications Information Systems Safety, Risk, Reliability and Quality Software
  • About
  • Disclaimer
  • Feedback
  • Sponsor
  • Contact
About National Digital Library of India (NDLI)
NDLI logo

National Digital Library of India (NDLI) is a virtual repository of learning resources which is not just a repository with search/browse facilities but provides a host of services for the learner community. It is sponsored and mentored by Ministry of Education, Government of India, through its National Mission on Education through Information and Communication Technology (NMEICT). Filtered and federated searching is employed to facilitate focused searching so that learners can find the right resource with least effort and in minimum time. NDLI provides user group-specific services such as Examination Preparatory for School and College students and job aspirants. Services for Researchers and general learners are also provided. NDLI is designed to hold content of any language and provides interface support for 10 most widely used Indian languages. It is built to provide support for all academic levels including researchers and life-long learners, all disciplines, all popular forms of access devices and differently-abled learners. It is designed to enable people to learn and prepare from best practices from all over the world and to facilitate researchers to perform inter-linked exploration from multiple sources. It is developed, operated and maintained from Indian Institute of Technology Kharagpur.

Learn more about this project from here.

Disclaimer

NDLI is a conglomeration of freely available or institutionally contributed or donated or publisher managed contents. Almost all these contents are hosted and accessed from respective sources. The responsibility for authenticity, relevance, completeness, accuracy, reliability and suitability of these contents rests with the respective organization and NDLI has no responsibility or liability for these. Every effort is made to keep the NDLI portal up and running smoothly unless there are some unavoidable technical issues.

Feedback

Sponsor

Ministry of Education, through its National Mission on Education through Information and Communication Technology (NMEICT), has sponsored and funded the National Digital Library of India (NDLI) project.

Contact National Digital Library of India
Central Library (ISO-9001:2015 Certified)
Indian Institute of Technology Kharagpur
Kharagpur, West Bengal, India | PIN - 721302
See location in the Map
03222 282435
Mail: support@ndl.gov.in
Sl. Authority Responsibilities Communication Details
1 Ministry of Education (GoI),
Department of Higher Education
Sanctioning Authority https://www.education.gov.in/ict-initiatives
2 Indian Institute of Technology Kharagpur Host Institute of the Project: The host institute of the project is responsible for providing infrastructure support and hosting the project https://www.iitkgp.ac.in
3 National Digital Library of India Office, Indian Institute of Technology Kharagpur The administrative and infrastructural headquarters of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
4 Project PI / Joint PI Principal Investigator and Joint Principal Investigators of the project Dr. B. Sutradhar  bsutra@ndl.gov.in
Prof. Saswat Chakrabarti  will be added soon
5 Website/Portal (Helpdesk) Queries regarding NDLI and its services support@ndl.gov.in
6 Contents and Copyright Issues Queries related to content curation and copyright issues content@ndl.gov.in
7 National Digital Library of India Club (NDLI Club) Queries related to NDLI Club formation, support, user awareness program, seminar/symposium, collaboration, social media, promotion, and outreach clubsupport@ndl.gov.in
8 Digital Preservation Centre (DPC) Assistance with digitizing and archiving copyright-free printed books dpc@ndl.gov.in
9 IDR Setup or Support Queries related to establishment and support of Institutional Digital Repository (IDR) and IDR workshops idr@ndl.gov.in
Cite this Content
Loading...