A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions
Tipus de documentText en actes de congrés
Condicions d'accésAccés restringit per política de l'editorial
After some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the light of the recent attacks to the MD5 hash function, SHA-1 remains currently the only function that can be used in practice, since it is the only alternative to MD5 in many security standards. This work presents a study of vulnerabilities in the SHA family, namely the SHA-0 and SHA-1 hash functions, based on a high-performance computing application run on the MariCel cluster available at the Barcelona Supercomputing Center. The effectiveness of the different optimizations and search strategies that have been used is validated by a comprehensive set of quantitative evaluations, presented in the paper. Most importantly, at the conclusion of our study, we were able to identify an actual collision for a 71-round version of SHA-1, the first ever found so far.
CitacióCilardo, A. [et al.]. A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions. A: IEEE International Conference on High Performance Computing and Communications. "2010 12th IEEE international conference on high performance computing and communications: HPCC 2010: 1-3 September 2010, Melbourne, Australia: proceedings". Melbourne: 2010, p. 450-457.
|A CellBE-based ... graphic Hash Functions.pdf||A CellBE-based HPC Application for the Analysis of Vulnerabilities in Cryptographic Hash Functions||1.048Mb||Accés restringit|