首页> 外文会议>International Conference on Information Security and Cryptology >Cryptanalysis of T-Function-Based Hash Functions Applications to MySQL Password Algorithms
【24h】

Cryptanalysis of T-Function-Based Hash Functions Applications to MySQL Password Algorithms

机译:基于T函数的哈希函数应用程序对MySQL密码算法的密码分析

获取原文

摘要

T-functions are a useful new tool to design symmetric-key algorithms, introduced by Klimov and Shamir in 2002. They have already been used to build stream ciphers and new applications for block ciphers and hash functions have been recently suggested. In this paper, we analyze the security of several possible constructions of hash functions, based on T-functions. We show that most natural ideas are insecure. As an application, we describe a practical preimage attack against the dedicated hash function used in the MySQL password-based authentication mechanisms.
机译:T-Function是一个有用的新工具,可以在2002年由Klimov和Shamir引入的对称关键算法。它们已被用来构建流密码和最近建议块密码和散列函数的新应用程序。在本文中,我们根据T函数分析哈希函数的几种可能结构的安全性。我们表明最自然的想法是不安全的。作为应用程序,我们描述了对基于MySQL密码的身份验证机制中使用的专用散列函数的实用预报攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号