Results 1 to 10 of about 311,948 (105)

Automating Collision Attacks on RIPEMD-160 [PDF]

open access: diamondIACR Transactions on Symmetric Cryptology, 2023
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex doublebranch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Yingxin Li, Fukang Liu, Gaoli Wang
doaj   +6 more sources

New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160 [PDF]

open access: greenIACR Transactions on Symmetric Cryptology, 2019
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1.
Fukang Liu   +5 more
doaj   +6 more sources

Cryptanalysis of 48-step RIPEMD-160

open access: greenIACR Transactions on Symmetric Cryptology, 2017
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 under the condition that only one internal variable contains difference and the difference is a power of 2.
Gaoli Wang, Yanzhao Shen, Fukang Liu
doaj   +6 more sources

A unified architecture of MD5 and RIPEMD-160 hash algorithms [PDF]

open access: closed2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512), 2004
Hash algorithms are important components in many cryptographic applications and security protocol suites. In this paper, a unified architecture for MD5 and RIPEMD-160 hash algorithms is developed.
Ng, CW, Ng, TS, Yip, KW
core   +4 more sources

Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP [PDF]

open access: closedIACR Cryptology ePrint Archive, 2023
The hash function RIPEMD-160 is an ISO/IEC standard and is being used to generate the bitcoin address together with SHA-256. Despite the fact that many hash functions in the MD-SHA hash family have been broken, RIPEMD-160 remains secure and the best ...
Fukang Liu   +6 more
core   +4 more sources

On the Collision Resistance of RIPEMD-160 [PDF]

open access: greenInformation Security Conference, 2006
Cryptographic hash functions are an important tool in cryptography for applications such as digital fingerprinting of messages, message authentication, and key derivation. During the last five years, several fast software hash functions have been proposed; most of them are based on the design principles of Ron Rivest's MD4. One such proposal was RIPEMD,
Florian Mendel   +3 more
semanticscholar   +8 more sources

Differential Attacks on Reduced RIPEMD-160 [PDF]

open access: greenDesigns, Codes and Cryptography, 2012
In this article, we propose an improved cryptanalysis of the double-branch hash function standard RIPEMD-160. Using a carefully designed non-linear path search tool, we study the potential differential paths that can be constructed from a difference in a single message word and show that some of these message words can lead to very good differential ...
Florian Mendel   +3 more
semanticscholar   +6 more sources

Enhancement in TLS Authentication with RIPEMD-160

open access: hybridInternational Journal of Advance Research and Innovation, 2014
This paper describes one of the security feature authentication. The main goal of this research is to achieve authentication to identify legal user and minimize the chance of attacks.
Mian Ahmad Zeb
semanticscholar   +3 more sources

Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160 [PDF]

open access: bronzeIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2013
SUMMARY This paper presents differential-based distinguishers against double-branch compression functions and applies them to ISO standard hash functions RIPEMD-128 and RIPEMD-160. A double-branch compression function computes two branch functions to update a chaining variable and then merges their outputs.
Yu Sasaki, Lei Wang
semanticscholar   +6 more sources

Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160 [PDF]

open access: closedInternational Conference on the Theory and Application of Cryptology and Information Security, 2017
In this work, we provide the first security analysis of reduced RIPEMD-160 regarding its collision resistance with practical complexity. The ISO/IEC standard RIPEMD-160 was proposed 15 years ago and may be used as a drop-in replacement for SHA-1 due to their same hash output length.
Fukang Liu, Florian Mendel, Gaoli Wang
semanticscholar   +5 more sources

Home - About - Disclaimer - Privacy