Category: Cryptography
-
Formal aspects of mobile code security – Chapter 5
Formal aspects of mobile code security – Chapter 5 PhD thesis for Richard Drews Dean 23 page chapter. Incomplete: Need to discuss how the author discovered attacks. Need to check my description using the detailed equations provided. I must illustrate the attack methods. The interest in this thesis is due to its reference in Heard…
-
SHA-1 Illustrated
By Nathan Fain Incomplete: must create detailed diagram for compression functions. The following simplifies the specification of SHA-1 in an easy to digest form. First we will cover the general structure of the algorithm. Detail of the expansion and compression routines are covered separately. First we start with a message. The message is padded and…
-
An Illustrated Guide to Cryptographic Hashes Intro.
An Illustrated Guide to Cryptographic Hashes by Steve Friedl 15 pages of text Update 2006.02.11: clearer explanation of CTFP preimage resistance. This is a very good introduction to what a hash algorithm is, what it is for and what collisions are all about. It does not cover specific details, only the general understanding. It’s a…
-
Herding Hash Functions
Herding Hash Functions and the Nostradamus Attack (presentation slides) by John Kelsey and Tadayoshi Kohno 8 pages of text The paper describes an attack that would allow an attacker to massage (“herd”) an object to a point where it matches a hash value chosen by the attacker prior. What appears to be an important restriction…