Preimage security evaluations on Rijndael-based hashing: a comprehensive study
The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques, as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions and key recovery for full-round KTANTAN. An efficient approach to constructing MITM attacks is automation, whi...
Saved in:
Main Author: | Zhang, Tianyu |
---|---|
Other Authors: | Guo Jian |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/166491 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Automatic search of Meet-in-the-Middle preimage attacks on AES-like hashing
by: Bao, Zhenzhen, et al.
Published: (2022) -
Analysis of cryptographic hash functions
by: Guo, Jian
Published: (2011) -
On the Bringer–Chabanne EPIR protocol for polynomial evaluation
by: Chee, Yeow Meng, et al.
Published: (2013) -
Improved meet-in-the-middle preimage attacks against AES hashing modes
by: Bao, Zhenzhen, et al.
Published: (2020) -
A study of private information retrieval and related primitives.
by: Zhang, Liang Feng
Published: (2012)