Sciweavers

Share
ACISP
2015
Springer

Bad Directions in Cryptographic Hash Functions

4 years 2 months ago
Bad Directions in Cryptographic Hash Functions
A 25-gigabyte “point obfuscation” challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation” is another name for password hashing. This paper shows that the particular matrix-multiplication hash function used in the challenge is much less secure than previous password-hashing functions are believed to be. This paper’s attack algorithm broke the challenge in just 19 minutes using a cluster of 21 PCs.
Daniel J. Bernstein, Andreas Hülsing, Tanja L
Added 13 Apr 2016
Updated 13 Apr 2016
Type Journal
Year 2015
Where ACISP
Authors Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen
Comments (0)
books