Bad Directions In Cryptographic Hash Functions

INFORMATION SECURITY AND PRIVACY (ACISP 2015)(2015)

引用 9|浏览95
暂无评分
摘要
A 25-gigabyte "point obfuscation" challenge "using security parameter 60" was announced at the Crypto 2014 rump session; "point obfuscation" is another name for password hashing. This paper shows that the particular matrix-multiplication hash function used in the challenge is much less secure than previous password-hashing functions are believed to be. This paper's attack algorithm broke the challenge in just 19 minutes using a cluster of 21 PCs.
更多
查看译文
关键词
Symmetric cryptography, Hash functions, Password hashing, Point obfuscation, Matrix multiplication, Meet-in-the-middle attacks, Meet-in-many-middles attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要