Mostra el registre d'ítem simple

dc.contributor.authorCilardo, Alessandro
dc.contributor.authorEsposito, Luigi
dc.contributor.authorVeniero, Antonio
dc.contributor.authorMazzeo, Antonino
dc.contributor.authorBeltran Querol, Vicenç
dc.contributor.authorAyguadé Parra, Eduard
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
dc.date.accessioned2014-11-07T14:16:48Z
dc.date.created2010
dc.date.issued2010
dc.identifier.citationCilardo, A. [et al.]. A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions. A: IEEE International Conference on High Performance Computing and Communications. "2010 12th IEEE international conference on high performance computing and communications: HPCC 2010: 1-3 September 2010, Melbourne, Australia: proceedings". Melbourne: 2010, p. 450-457.
dc.identifier.isbn978-0-7695-4214-0
dc.identifier.urihttp://hdl.handle.net/2117/24604
dc.description.abstractAfter some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the light of the recent attacks to the MD5 hash function, SHA-1 remains currently the only function that can be used in practice, since it is the only alternative to MD5 in many security standards. This work presents a study of vulnerabilities in the SHA family, namely the SHA-0 and SHA-1 hash functions, based on a high-performance computing application run on the MariCel cluster available at the Barcelona Supercomputing Center. The effectiveness of the different optimizations and search strategies that have been used is validated by a comprehensive set of quantitative evaluations, presented in the paper. Most importantly, at the conclusion of our study, we were able to identify an actual collision for a 71-round version of SHA-1, the first ever found so far.
dc.format.extent8 p.
dc.language.isoeng
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Spain
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia
dc.subjectÀrees temàtiques de la UPC::Enginyeria de la telecomunicació
dc.subject.lcshCryptography
dc.subject.lcshComputer security
dc.subject.otherCryptography
dc.subject.otherOptimisation
dc.subject.otherSearch problems
dc.subject.otherBarcelona supercomputing center
dc.subject.otherCellBE
dc.subject.otherHPC application
dc.subject.otherMD5 hash function
dc.subject.otherMariCel cluster
dc.subject.otherSHA-1
dc.subject.otherCryptographic hash functions
dc.subject.otherOptimizations
dc.subject.otherSearch strategies
dc.titleA CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions
dc.typeConference report
dc.subject.lemacCriptografia
dc.subject.lemacSeguretat informàtica
dc.contributor.groupUniversitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions
dc.identifier.doi10.1109/HPCC.2010.113
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5581445&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5581445
dc.rights.accessRestricted access - publisher's policy
local.identifier.drac15142353
dc.description.versionPostprint (published version)
dc.date.lift10000-01-01
local.citation.authorCilardo, A.; Esposito, L.; Veniero, A.; Mazzeo, A.; Beltran, V.; Ayguade, E.
local.citation.contributorIEEE International Conference on High Performance Computing and Communications
local.citation.pubplaceMelbourne
local.citation.publicationName2010 12th IEEE international conference on high performance computing and communications: HPCC 2010: 1-3 September 2010, Melbourne, Australia: proceedings
local.citation.startingPage450
local.citation.endingPage457


Fitxers d'aquest items

Imatge en miniatura

Aquest ítem apareix a les col·leccions següents

Mostra el registre d'ítem simple