Results 1 to 10 of about 11,170 (172)

Automating Collision Attacks on RIPEMD-160

open access: diamondIACR Transactions on Symmetric Cryptology, 2023
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex doublebranch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Yingxin Li, Fukang Liu, Gaoli Wang
doaj   +4 more sources

Algebraic Collision Attacks on Keccak

open access: diamondIACR Transactions on Symmetric Cryptology, 2021
In this paper, we analyze the collision resistance of the two smallest versions of Keccak which have a width of 200 and 400 bits respectively. We show that algebraic and linearization techniques can serve collision cryptanalysis by using some interesting
Rachelle Heim Boissier   +2 more
doaj   +5 more sources

Stochastic Collision Attack

open access: greenIEEE Transactions on Information Forensics and Security, 2017
On the one hand, collision attacks have been introduced in the context of side-channel analysis for attackers who exploit repeated code with the same data without having any knowledge of the leakage model. On the other hand, stochastic attacks have been introduced to recover leakage models of internally processed intermediate secret variables.
Nicolas Bruneau   +5 more
openalex   +5 more sources

Instruction-Fetching Attack and Practice in Collision Fault Attack on AES [PDF]

open access: goldSymmetry, 2022
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to security chips. Instruction corruption can enact the same purpose at the behavioral level, which is produced by interfering with the instruction system. Laser Fault Injection (LFI) on program memory during the instruction-fetching process, which we refer to as
Huilong Jiang, Xiang Zhu, Jianwei Han
openalex   +2 more sources

Fake Near Collisions Attacks

open access: diamondIACR Transactions on Symmetric Cryptology, 2020
Fast Near collision attacks on the stream ciphers Grain v1 and A5/1 were presented at Eurocrypt 2018 and Asiacrypt 2019 respectively. They use the fact that the entire internal state can be split into two parts so that the second part can be recovered from the first one which can be found using the keystream prefix and some guesses of the key materials.
Patrick Derbez   +2 more
openalex   +6 more sources

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes

open access: greenIACR Transactions on Symmetric Cryptology, 2016
Since Knudsen and Rijmen proposed the known-key attacks in ASIACRYPT 2007, the open-key model becomes more and more popular. As the other component of the open-key model, chosen-key model was applied to the full attacks on AES-256 by Biryukov et al.
Xiaoyang Dong, Xiaoyun Wang
doaj   +4 more sources

Preimage and collision attacks on reduced Ascon using algebraic strategies [PDF]

open access: diamondCybersecurity
Ascon, a family of algorithms that supports hashing and authenticated encryption, is the winner of the NIST Lightweight Cryptography Project. In this paper, we propose an improved preimage attack against 2-round Ascon-XOF-64 with a complexity of $$2^{33}$
Qinggan Fu   +3 more
doaj   +2 more sources

Optimizing Fast Near Collision Attack on Grain Using Linear Programming [PDF]

open access: goldIEEE Access, 2019
In 2018, an attack named fast-near-collision attack (FNCA) was proposed, which is an improved version of near-collision attack (NCA) on Grain-v1, one of the three hardware-oriented finalists of the eSTREAM project.
Senshan Pan, Yueping Wu, Liangmin Wang
doaj   +2 more sources

Improved 2-round collision attack on IoT hash standard ASCON-HASH [PDF]

open access: yesHeliyon
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai   +4 more
doaj   +2 more sources

Understanding realistic attacks on airborne collision avoidance systems [PDF]

open access: hybridJournal of Transportation Security, 2022
AbstractAirborne collision avoidance systems provide an onboard safety net should normal air traffic control procedures fail to keep aircraft separated. These systems are widely deployed and have been constantly refined over the past three decades, usually in response to near misses or mid-air collisions.
Matthew Smith   +3 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy