메뉴 건너뛰기




Volumn 4296 LNCS, Issue , 2006, Pages 267-285

Cryptanalysis of T-function-based hash functions applications to MySQL password algorithms

Author keywords

Hash functions; MySQL; T functions

Indexed keywords

ALGORITHMS; AUTHENTICATION; FUNCTIONS; SECURITY OF DATA;

EID: 34547426005     PISSN: 03029743     EISSN: 16113349     Source Type: Conference Proceeding    
DOI: 10.1007/11927587_23     Document Type: Conference Paper
Times cited : (2)

References (23)
  • 1
    • 34547456042 scopus 로고    scopus 로고
    • I. Arce, A. Azubel, E. Kargieman, G. Richarte, C. Sarraute, and A. Waissbein. An attack on the MySQL authentication protocol. 2002. Technical report from Core Security Technologies.
    • I. Arce, A. Azubel, E. Kargieman, G. Richarte, C. Sarraute, and A. Waissbein. An attack on the MySQL authentication protocol. 2002. Technical report from Core Security Technologies.
  • 2
    • 33745119040 scopus 로고    scopus 로고
    • J-S. Coron, Y. Dodis, C. Malinaud, and P. Puniya. Merkle-Damgárd Revisited: How to Construct a Hash Function. In V. Shoup, editor, Advances in Cryptology - Crypto '05, 3621 of Lectures Notes in Computer Science, pages 430-448. Springer, 2005.
    • J-S. Coron, Y. Dodis, C. Malinaud, and P. Puniya. Merkle-Damgárd Revisited: How to Construct a Hash Function. In V. Shoup, editor, Advances in Cryptology - Crypto '05, volume 3621 of Lectures Notes in Computer Science, pages 430-448. Springer, 2005.
  • 3
    • 26444471932 scopus 로고    scopus 로고
    • J. Hong, D. Lee, Y. Yeom, and D. Han. A New Class of Single Cycle T-functions. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption - 2005, 3557 of Lectures Notes in Computer Science, pages 68-82. Springer, 2005.
    • J. Hong, D. Lee, Y. Yeom, and D. Han. A New Class of Single Cycle T-functions. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption - 2005, volume 3557 of Lectures Notes in Computer Science, pages 68-82. Springer, 2005.
  • 4
    • 33645780237 scopus 로고    scopus 로고
    • A. Joux. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In M. Franklin, editor, Advances in Cryptology - CRYPTO'04, 3152 of Lectures Notes in Computer Science, pages 306-316. Springer, 2004.
    • A. Joux. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In M. Franklin, editor, Advances in Cryptology - CRYPTO'04, volume 3152 of Lectures Notes in Computer Science, pages 306-316. Springer, 2004.
  • 5
    • 24944541563 scopus 로고    scopus 로고
    • n Work. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, 3494 of Lectures Notes in Computer Science, pages 474-490. Springer, 2005.
    • n Work. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 474-490. Springer, 2005.
  • 7
    • 35248838905 scopus 로고    scopus 로고
    • A. Klimov and A. Shamir. A New Class of Invertible Mappings. In B. Kaliski, Ç. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES) - 2002, 2523 of Lectures Notes in Computer Science, pages 470-483. Springer, 2002.
    • A. Klimov and A. Shamir. A New Class of Invertible Mappings. In B. Kaliski, Ç. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES) - 2002, volume 2523 of Lectures Notes in Computer Science, pages 470-483. Springer, 2002.
  • 8
    • 35048887028 scopus 로고    scopus 로고
    • A. Klimov and A. Shamir. Cryptographic Applications of T-functions. In M. Matsui and R. Zuccherato, editors, Selected Areas in Cryptography - 2003, 3006 of Lectures Notes in Computer Science, pages 248-261. Springer, 2004.
    • A. Klimov and A. Shamir. Cryptographic Applications of T-functions. In M. Matsui and R. Zuccherato, editors, Selected Areas in Cryptography - 2003, volume 3006 of Lectures Notes in Computer Science, pages 248-261. Springer, 2004.
  • 9
    • 26444603942 scopus 로고    scopus 로고
    • A. Klimov and A. Shamir, New Applications of T-functions in Block Ciphers and Hash Functions. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption - 2005, 3557 of Lectures Notes in Computer Science, pages 18-31, Springer, 2005.
    • A. Klimov and A. Shamir, New Applications of T-functions in Block Ciphers and Hash Functions. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption - 2005, volume 3557 of Lectures Notes in Computer Science, pages 18-31, Springer, 2005.
  • 10
    • 26444604937 scopus 로고    scopus 로고
    • L. Knudsen, SMASH - A Cryptographic Hash Function. In H. Gilbert and H, Hand-schuh, editors, Fast Software Encryption - 2005, 3557 of Lectures Notes in Computer Science, pages 228-242, Springer, 2005.
    • L. Knudsen, SMASH - A Cryptographic Hash Function. In H. Gilbert and H, Hand-schuh, editors, Fast Software Encryption - 2005, volume 3557 of Lectures Notes in Computer Science, pages 228-242, Springer, 2005.
  • 11
    • 33646195464 scopus 로고    scopus 로고
    • S. Künzli, P. Junod, and W. Meier. Distinguishing Attacks on T-Functions. In E. Dawson and S. Vaudenay, editors, International Conference on Cryptology in Malaysia (MyCrypt 2005), 3715 of Lectures Notes in Computer Science, pages 2-15. Springer, 2005.
    • S. Künzli, P. Junod, and W. Meier. Distinguishing Attacks on T-Functions. In E. Dawson and S. Vaudenay, editors, International Conference on Cryptology in Malaysia (MyCrypt 2005), volume 3715 of Lectures Notes in Computer Science, pages 2-15. Springer, 2005.
  • 12
    • 84944878354 scopus 로고    scopus 로고
    • A. Menezes, P. van 0orschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.
    • A. Menezes, P. van 0orschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.
  • 13
    • 26444432184 scopus 로고    scopus 로고
    • J. Mitra and P. Sarkar. Time-Memory Trade-Off Attacks on Multiplications and T-functions, In P. Lee, editor, Advances in Cryptology - Asiacrypt'04, 3329 of Lectures Notes in Computer Science, pages 468-482. Springer, 2004.
    • J. Mitra and P. Sarkar. Time-Memory Trade-Off Attacks on Multiplications and T-functions, In P. Lee, editor, Advances in Cryptology - Asiacrypt'04, volume 3329 of Lectures Notes in Computer Science, pages 468-482. Springer, 2004.
  • 14
    • 33646818680 scopus 로고    scopus 로고
    • F. Muller and T. Peyrin. Linear Cryptanalysis of the TSC Family of Stream Ciphers. In B. K. Roy, editor, Advances in Cryptology - Asiacrypt'05, 3788 of Lectures Notes in Computer Science, pages 373-394. Springer, 2005.
    • F. Muller and T. Peyrin. Linear Cryptanalysis of the TSC Family of Stream Ciphers. In B. K. Roy, editor, Advances in Cryptology - Asiacrypt'05, volume 3788 of Lectures Notes in Computer Science, pages 373-394. Springer, 2005.
  • 17
    • 34547415046 scopus 로고
    • National Institute of Standards and Technology NIST, April, Available at
    • National Institute of Standards and Technology (NIST). Secure Hash Standard FIPS Publication 180-1, April 1995. Available at http://www.itl.nist. gov/fipspubs/fip180-1.htm.
    • (1995) Secure Hash Standard FIPS Publication 180-1
  • 18
    • 34547491324 scopus 로고    scopus 로고
    • J. Patarin and P. Camion. Design of Near-Optimal Pseudorandom Functions and Pseudorandom Permutations in the Information-Theoretic Model. Cryptology ePrint Archive, Report 2005/135, 2005. http://eprint.iacr.org/.
    • J. Patarin and P. Camion. Design of Near-Optimal Pseudorandom Functions and Pseudorandom Permutations in the Information-Theoretic Model. Cryptology ePrint Archive, Report 2005/135, 2005. http://eprint.iacr.org/.
  • 20
    • 33745628759 scopus 로고    scopus 로고
    • N. Pramstaller, C. Rechberger, and V. Rijmen. Breaking a New Hash Function Design Strategy Called SMASH. In B. Preneel and S. E. Tavares, editors, Selected Areas in Cryptography - 2005, 3897 of Lectures Notes in Computer Science, pages 233-244. Springer, 2005.
    • N. Pramstaller, C. Rechberger, and V. Rijmen. Breaking a New Hash Function Design Strategy Called SMASH. In B. Preneel and S. E. Tavares, editors, Selected Areas in Cryptography - 2005, volume 3897 of Lectures Notes in Computer Science, pages 233-244. Springer, 2005.
  • 22
    • 33745171465 scopus 로고    scopus 로고
    • X. Wang, Y. Yin, and H. Yu. Finding Collisions in the Full SHA1. In V. Shoup, editor, Advances in Cryptology - Crypto'05, 3621 of Lectures Notes in Computer Science, pages 17-36. Springer, 2005.
    • X. Wang, Y. Yin, and H. Yu. Finding Collisions in the Full SHA1. In V. Shoup, editor, Advances in Cryptology - Crypto'05, volume 3621 of Lectures Notes in Computer Science, pages 17-36. Springer, 2005.
  • 23
    • 24944591357 scopus 로고    scopus 로고
    • X. Wang and H. Yu. How to Break MD5 and Other Hash Functions. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, 3494 of Lectures Notes in Computer Science, pages 19-35. Springer, 2005.
    • X. Wang and H. Yu. How to Break MD5 and Other Hash Functions. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 19-35. Springer, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.