A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions
View/Open
A CellBE-based HPC Application for the Analysis of Vulnerabilities in Cryptographic Hash Functions (1,048Mb) (Restricted access)
Request copy
Què és aquest botó?
Aquest botó permet demanar una còpia d'un document restringit a l'autor. Es mostra quan:
- Disposem del correu electrònic de l'autor
- El document té una mida inferior a 20 Mb
- Es tracta d'un document d'accés restringit per decisió de l'autor o d'un document d'accés restringit per política de l'editorial
Cita com:
hdl:2117/24604
Document typeConference report
Defense date2010
Rights accessRestricted access - publisher's policy
This work is protected by the corresponding intellectual and industrial property rights.
Except where otherwise noted, its contents are licensed under a Creative Commons license
:
Attribution-NonCommercial-NoDerivs 3.0 Spain
Abstract
After some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the light of the recent attacks to the MD5 hash function, SHA-1 remains currently the only function that can be used in practice, since it is the only alternative to MD5 in many security standards. This work presents a study of vulnerabilities in the SHA family, namely the SHA-0 and SHA-1 hash functions, based on a high-performance computing application run on the MariCel cluster available at the Barcelona Supercomputing Center. The effectiveness of the different optimizations and search strategies that have been used is validated by a comprehensive set of quantitative evaluations, presented in the paper. Most importantly, at the conclusion of our study, we were able to identify an actual collision for a 71-round version of SHA-1, the first ever found so far.
CitationCilardo, A. [et al.]. A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions. A: IEEE International Conference on High Performance Computing and Communications. "2010 12th IEEE international conference on high performance computing and communications: HPCC 2010: 1-3 September 2010, Melbourne, Australia: proceedings". Melbourne: 2010, p. 450-457.
ISBN978-0-7695-4214-0
Files | Description | Size | Format | View |
---|---|---|---|---|
A CellBE-based ... graphic Hash Functions.pdf![]() | A CellBE-based HPC Application for the Analysis of Vulnerabilities in Cryptographic Hash Functions | 1,048Mb | Restricted access |