all InfoSec news
Automated Meet-in-the-Middle Attack Goes to Feistel
Sept. 13, 2023, 6:12 a.m. |
IACR News www.iacr.org
ePrint Report: Automated Meet-in-the-Middle Attack Goes to Feistel
Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang
Feistel network and its generalizations (GFN) are another important building blocks for constructing hash functions, e.g., Simpira v2, Areion, and the ISO standard Lesamnta-LW. The Meet-in-the-Middle (MitM) is a general paradigm to build preimage and collision attacks on hash functions, which has been automated in several papers. However, those automatic tools mostly focus on the hash function with Substitution-Permutation network (SPN) as …
attack automated build collision eprint report functions general hash hash functions important iso mitm network paradigm report standard wang
More from www.iacr.org / IACR News
Post-Doc in Lattice-Based Cryptography
1 day, 15 hours ago |
www.iacr.org
WPEC 2024: NIST Workshop on Privacy Enhancing Cryptography
1 day, 15 hours ago |
www.iacr.org
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants
1 day, 20 hours ago |
www.iacr.org
Securing the Future of GenAI: Policy and Technology
1 day, 20 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC