all InfoSec news
Comprehensive Preimage Security Evaluations on Rijndael-based Hashing
May 1, 2023, 12:42 p.m. |
IACR News www.iacr.org
ePrint Report: Comprehensive Preimage Security Evaluations on Rijndael-based Hashing
Tianyu Zhang
The Meet-in-the-Middle (MITM) attack is one of the most powerful cryptanalysis techniques, as seen by its use in preimage attacks on MD4, MD5, Tiger, HAVAL, and Haraka-512 v2 hash functions and key recovery for full-round KTANTAN. An efficient approach to constructing MITM attacks is automation, which refers to modeling MITM characteristics and objectives into constraints and using optimizers to search for the best attack configuration. This work focuses on …
attack attacks cryptanalysis eprint report functions hash hash functions hashing key md5 mitm recovery report security techniques
More from www.iacr.org / IACR News
Blink: An Optimal Proof of Proof-of-Work
1 day, 18 hours ago |
www.iacr.org
PN-based Attacks in the White-box Setting
1 day, 18 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Security Problem Manager
@ Deutsche Bank | Bucharest
Information System Security Officer
@ Booz Allen Hamilton | USA, VA, Chantilly (15009 Conference Ctr Dr)
Senior Account Executive - Cybersecurity
@ OpenText | Virtual, CA
Grants Compliance Senior Specialist
@ Plan International | Bamako, Mali
Sr. Cybersecurity Engineer- Tenable
@ phia, LLC | Arlington, VA
Portfolio Manager- Enterprise Information Security Auditing
@ American Chemical Society | Columbus, OH, US, 43202