Sponsored Links
-->

Wednesday, February 7, 2018

Hashes Lesson Introduction ○The birthday paradox and length of ...
src: images.slideplayer.com

This article summarizes publicly known attacks against cryptographic hash functions. Note that not all entries may be up to date. For a summary of other hash function parameters, see comparison of cryptographic hash functions.


Video Hash function security summary



Table color key


Maps Hash function security summary



Common hash functions

Collision resistance

Chosen prefix collision attack

Preimage resistance


Hashes Lesson Introduction ○The birthday paradox and length of ...
src: images.slideplayer.com


Less common hash functions

Collision resistance

Preimage resistance


Presented by Sharan Dhanala - ppt video online download
src: slideplayer.com


See also

  • Comparison of cryptographic hash functions
  • Cryptographic hash function
  • Collision attack
  • Preimage attack
  • Cipher security summary

1 Some Current Thinking on Hash Functions Within NIST John Kelsey ...
src: images.slideplayer.com


References


Hashes Lesson Introduction ○The birthday paradox and length of ...
src: images.slideplayer.com


External links

  • 2010 summary of attacks against Tiger, MD4 and SHA-2: Jian Guo; San Ling; Christian Rechberger; Huaxiong Wang (2010-12-06). Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Asiacrypt 2010. p. 3. 

Source of the article : Wikipedia

Comments
0 Comments