Results 1 to 10 of about 311,948 (105)
Automating Collision Attacks on RIPEMD-160 [PDF]
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex doublebranch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Yingxin Li, Fukang Liu, Gaoli Wang
doaj +6 more sources
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160 [PDF]
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1.
Fukang Liu +5 more
doaj +6 more sources
Cryptanalysis of 48-step RIPEMD-160
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 under the condition that only one internal variable contains difference and the difference is a power of 2.
Gaoli Wang, Yanzhao Shen, Fukang Liu
doaj +6 more sources
A unified architecture of MD5 and RIPEMD-160 hash algorithms [PDF]
Hash algorithms are important components in many cryptographic applications and security protocol suites. In this paper, a unified architecture for MD5 and RIPEMD-160 hash algorithms is developed.
Ng, CW, Ng, TS, Yip, KW
core +4 more sources
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP [PDF]
The hash function RIPEMD-160 is an ISO/IEC standard and is being used to generate the bitcoin address together with SHA-256. Despite the fact that many hash functions in the MD-SHA hash family have been broken, RIPEMD-160 remains secure and the best ...
Fukang Liu +6 more
core +4 more sources
On the Collision Resistance of RIPEMD-160 [PDF]
Cryptographic hash functions are an important tool in cryptography for applications such as digital fingerprinting of messages, message authentication, and key derivation. During the last five years, several fast software hash functions have been proposed; most of them are based on the design principles of Ron Rivest's MD4. One such proposal was RIPEMD,
Florian Mendel +3 more
semanticscholar +8 more sources
Differential Attacks on Reduced RIPEMD-160 [PDF]
In this article, we propose an improved cryptanalysis of the double-branch hash function standard RIPEMD-160. Using a carefully designed non-linear path search tool, we study the potential differential paths that can be constructed from a difference in a single message word and show that some of these message words can lead to very good differential ...
Florian Mendel +3 more
semanticscholar +6 more sources
Enhancement in TLS Authentication with RIPEMD-160
This paper describes one of the security feature authentication. The main goal of this research is to achieve authentication to identify legal user and minimize the chance of attacks.
Mian Ahmad Zeb
semanticscholar +3 more sources
Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160 [PDF]
SUMMARY This paper presents differential-based distinguishers against double-branch compression functions and applies them to ISO standard hash functions RIPEMD-128 and RIPEMD-160. A double-branch compression function computes two branch functions to update a chaining variable and then merges their outputs.
Yu Sasaki, Lei Wang
semanticscholar +6 more sources
Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 [PDF]
In this work, we provide the first security analysis of reduced RIPEMD-160 regarding its collision resistance with practical complexity. The ISO/IEC standard RIPEMD-160 was proposed 15 years ago and may be used as a drop-in replacement for SHA-1 due to their same hash output length.
Fukang Liu, Florian Mendel, Gaoli Wang
semanticscholar +5 more sources

