Hash gone bad: automated discovery of protocol attacks that exploit hash function weaknesses
Abstract
References
Recommendations
Hash Function Vulnerability Index and Hash Chain Attacks
NPSEC '07: Proceedings of the 2007 3rd IEEE Workshop on Secure Network ProtocolsA hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash ...
Bad-token: denial of service attacks on WPA3
SIN '19: Proceedings of the 12th International Conference on Security of Information and NetworksWPA3 (Wi-Fi Protected Access 3) is a certification that augments its predecessor WPA2 with protection mechanisms, such as resistance against password dictionary attacks through SAE (Simultaneous Authentication of Equals) handshake, MFP (Management Frame ...
Public-Coin concurrent zero-knowledge in the global hash model
TCC'13: Proceedings of the 10th theory of cryptography conference on Theory of CryptographyPublic-coin zero-knowledge and concurrent zero-knowledge (cZK) are two classes of zero knowledge protocols that guarantee some additional desirable properties. Still, to this date no protocol is known that is both public-coin and cZK for a language ...
Comments
Information & Contributors
Information
Published In
Sponsors
- Meta
- Google Inc.
- NSF
- IBM
- Futurewei Technologies
Publisher
USENIX Association
United States
Publication History
Qualifiers
- Research-article
- Research
- Refereed limited
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0