Bad directions in cryptographic hash functions

D.J. Bernstein, A.T. Hülsing, T. Lange, R.F. Niederhagen

Onderzoeksoutput: Boek/rapportRapportAcademic

300 Downloads (Pure)

Samenvatting

A 25-gigabyte "point obfuscation" challenge "using security parameter 60" was announced at the Crypto 2015 rump session; "point obfuscation" is another name for password hashing. This paper shows that the particular matrix-multiplication hash function used in the challenge is much less secure than previous password-hashing functions are believed to be. This paper's attack algorithm broke the challenge in just 19 minutes using a cluster of 21 PCs. Keywords: symmetric cryptography, hash functions, password hashing, point obfuscation, matrix multiplication, meet-in-the-middle attacks, meet-in-many-middles attacks
Originele taal-2Engels
UitgeverijIACR
Aantal pagina's27
StatusGepubliceerd - 2015

Publicatie series

NaamCryptology ePrint Archive
Volume2015/151

Vingerafdruk

Duik in de onderzoeksthema's van 'Bad directions in cryptographic hash functions'. Samen vormen ze een unieke vingerafdruk.

Citeer dit