Some Attacks on Cryptographic Hash Functions

Download Now
Provided by: IJAIR
Topic: Security
Format: PDF
Hash functions are used in various applications which require specific properties. Therefore, these cryptographic tools are designed in order to satisfy the desired properties The methods for analyzing hash functions, or attacks shortly, can be classified in various types according to the main parameters used in the attack. For example some attacks depend only on the hash size while other attacks may also depend on chaining value or compression function. At this point, one can categorize attacks, in a more general fashion, as generic attacks and specific attacks.
Download Now

Find By Topic