Mostra el registre d'ítem simple
A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions
dc.contributor.author | Cilardo, Alessandro |
dc.contributor.author | Esposito, Luigi |
dc.contributor.author | Veniero, Antonio |
dc.contributor.author | Mazzeo, Antonino |
dc.contributor.author | Beltran Querol, Vicenç |
dc.contributor.author | Ayguadé Parra, Eduard |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors |
dc.date.accessioned | 2014-11-07T14:16:48Z |
dc.date.created | 2010 |
dc.date.issued | 2010 |
dc.identifier.citation | Cilardo, A. [et al.]. A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions. A: IEEE International Conference on High Performance Computing and Communications. "2010 12th IEEE international conference on high performance computing and communications: HPCC 2010: 1-3 September 2010, Melbourne, Australia: proceedings". Melbourne: 2010, p. 450-457. |
dc.identifier.isbn | 978-0-7695-4214-0 |
dc.identifier.uri | http://hdl.handle.net/2117/24604 |
dc.description.abstract | After some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the light of the recent attacks to the MD5 hash function, SHA-1 remains currently the only function that can be used in practice, since it is the only alternative to MD5 in many security standards. This work presents a study of vulnerabilities in the SHA family, namely the SHA-0 and SHA-1 hash functions, based on a high-performance computing application run on the MariCel cluster available at the Barcelona Supercomputing Center. The effectiveness of the different optimizations and search strategies that have been used is validated by a comprehensive set of quantitative evaluations, presented in the paper. Most importantly, at the conclusion of our study, we were able to identify an actual collision for a 71-round version of SHA-1, the first ever found so far. |
dc.format.extent | 8 p. |
dc.language.iso | eng |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia |
dc.subject | Àrees temàtiques de la UPC::Enginyeria de la telecomunicació |
dc.subject.lcsh | Cryptography |
dc.subject.lcsh | Computer security |
dc.subject.other | Cryptography |
dc.subject.other | Optimisation |
dc.subject.other | Search problems |
dc.subject.other | Barcelona supercomputing center |
dc.subject.other | CellBE |
dc.subject.other | HPC application |
dc.subject.other | MD5 hash function |
dc.subject.other | MariCel cluster |
dc.subject.other | SHA-1 |
dc.subject.other | Cryptographic hash functions |
dc.subject.other | Optimizations |
dc.subject.other | Search strategies |
dc.title | A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions |
dc.type | Conference report |
dc.subject.lemac | Criptografia |
dc.subject.lemac | Seguretat informàtica |
dc.contributor.group | Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions |
dc.identifier.doi | 10.1109/HPCC.2010.113 |
dc.description.peerreviewed | Peer Reviewed |
dc.relation.publisherversion | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5581445&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5581445 |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 15142353 |
dc.description.version | Postprint (published version) |
dc.date.lift | 10000-01-01 |
local.citation.author | Cilardo, A.; Esposito, L.; Veniero, A.; Mazzeo, A.; Beltran, V.; Ayguade, E. |
local.citation.contributor | IEEE International Conference on High Performance Computing and Communications |
local.citation.pubplace | Melbourne |
local.citation.publicationName | 2010 12th IEEE international conference on high performance computing and communications: HPCC 2010: 1-3 September 2010, Melbourne, Australia: proceedings |
local.citation.startingPage | 450 |
local.citation.endingPage | 457 |