Cryptanalysis of t-function-based hash functions

ICISC(2006)

引用 8|浏览2
暂无评分
摘要
T-functions are a useful new tool to design symmetric-key algorithms, introduced by Klimov and Shamir in 2002. They have already been used to build stream ciphers and new applications for block ciphers and hash functions have been recently suggested. In this paper, we analyze the security of several possible constructions of hash functions, based on T-functions. We show that most natural ideas are insecure. As an application, we describe a practical preimage attack against the dedicated hash function used in the MySQL password-based authentication mechanisms.
更多
查看译文
关键词
new application,useful new tool,hash function,stream cipher,possible construction,block cipher,dedicated hash,natural idea,practical preimage attack,t-function-based hash function,authentication mechanism,hash functions
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要