Bad directions in cryptographic hash functions

Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Abstract

A 25-gigabyte “point obfuscation” challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation” is another name for password hashing. This paper shows that the particular matrix-multiplication hash function used in the challenge is much less secure than previous password-hashing functions are believed to be. This paper’s attack algorithm broke the challenge in just 19 minutes using a cluster of 21 PCs.

Original languageEnglish
Title of host publicationInformation Security and Privacy
Subtitle of host publication20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings
EditorsE. Foo, D. Stebila
Place of PublicationBerlin
PublisherSpringer
Pages488-508
Number of pages21
ISBN (Print)9783319199610
DOIs
Publication statusPublished - 2015
Event20th Australasian Conference on Information Security and Privacy (ACISP 2015), June 29-July 1, 2015, Brisbane, Australia - Queensland University of Technology, Brisbane, Australia
Duration: 29 Jun 20151 Jul 2015
http://acisp2015.qut.edu.au/

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9144
ISSN (Print)03029743
ISSN (Electronic)16113349

Conference

Conference20th Australasian Conference on Information Security and Privacy (ACISP 2015), June 29-July 1, 2015, Brisbane, Australia
Abbreviated titleACISP 2015
Country/TerritoryAustralia
CityBrisbane
Period29/06/151/07/15
Internet address

Keywords

  • Hash functions
  • Matrix multiplication
  • Meet-in-many-middles attacks
  • Meet-in-the-middle attacks
  • Password hashing
  • Point obfuscation
  • Symmetric cryptography

Fingerprint

Dive into the research topics of 'Bad directions in cryptographic hash functions'. Together they form a unique fingerprint.

Cite this