A Symbolic Intruder Model for Hash-Collision Attacks

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

In the recent years, several practical methods have been published to compute collisions on some commonly used hash functions. In this paper we present a method to take into account, at the symbolic level, that an intruder actively attacking a protocol execution may use these collision algorithms in reasonable time during the attack. Our decision procedure relies on the reduction of constraint solving for an intruder exploiting the collision properties of hush functions to constraint solving for an intruder operating on words.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

A Symbolic Intruder Model for Hash-Collision Attacks does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with A Symbolic Intruder Model for Hash-Collision Attacks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A Symbolic Intruder Model for Hash-Collision Attacks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-350549

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.