Skip to main content

Questions tagged [collision-attack]

For attacks on hash functions that achieve hash collisions with less work than the birthday bound.

6 votes
1 answer
866 views

I am trying to understand the practical implications of a hash function that is weak collision resistant, but not strong collision resistant. That is, an attacker can efficiently find some pair of ...
ATW's user avatar
  • 253
0 votes
0 answers
115 views

Respected mathematicians, I would like to know if there is any GitHub repository that accurately converts SHA-family algorithms into SAT problems. So far, I found the SAT encoder by Saeed Nejati to be ...
user avatar
0 votes
2 answers
216 views

Is there any respected mathematician who can correctly transform the double SHA proof-of-work (used in Bitcoin mining) into a satisfiability (SAT) problem, ensuring that the CNF conversion is done ...
user avatar
1 vote
0 answers
77 views

What is the $n+m$ value for leading $0$s $k$ round SHA-256 hash collision problem when we convert $k$ round SHA-256 to $n$ variable 3SAT in $m$ clauses? By leading $0$s $k$ round SHA-256 hash ...
Turbo's user avatar
  • 1,215
4 votes
2 answers
759 views

Edit: background: I was thinking about using iterating $H$ on some arbitrary $x$ to find a collision. Eventually I will have a cycle for the first time, and until then $x, H^1(x), H^2(x), \dots$ are ...
Guanyuming He's user avatar
-1 votes
1 answer
165 views

I'm experimenting with hash functions in PHP using the built-in hash() function... and I've stumbled upon something interesting: I have found collision in fnv132 ...
Yousha Aleayoub's user avatar
1 vote
1 answer
135 views

This question is in regards to "A Graduate Course in Applied Cryptography" by Boneh-Shoup, section 6.4.1 "The CBC prefix-free secure PRF". In the proof for the security strength of ...
Evgeni Vaknin's user avatar
1 vote
1 answer
184 views

I have been asked what is a problem with hash function: $$h(S) = \left(\left(\sum S[i]*x^i\right)\bmod p\right)\bmod m$$ where $i=\{0,\ldots,s-1\}\,$; $S$ is some long string; $x$ is some positive ...
Pavel's user avatar
  • 11
2 votes
1 answer
203 views

In Dan Boneh's lecture Exhaustive Search Attacks from module 2 of his coursera course, he gives an explanation for why the probability of two different DES keys ...
efthimio's user avatar
  • 123
5 votes
2 answers
206 views

I've recently discovered a potential vulnerability in the type system of Haskell, a functional programming language in use in critical applications at Facebook, Standard Chartered, Input Output et ...
Curious Programmer's user avatar
3 votes
2 answers
180 views

Same as the title. How can an attacker find a collision in a keyed digest without knowing the key? Does using a keyed digest eliminate the problem of collisions?
allexj's user avatar
  • 163
0 votes
2 answers
1k views

I have an MD5 hash and need to generate a file that matches it. There are absolutely no constrains on the contents of said file, it can be binary gibberish. The only important thing is that it matches ...
Werdck's user avatar
  • 11
2 votes
2 answers
85 views

I have an implementation of PBKDF2, which I know Has two bytes of '=' at the end of the input Has an input length of 24 (which is a Base64 encoded character representation of 16 bytes of entropy) ...
Evan Carroll's user avatar
0 votes
0 answers
124 views

As suggested by the title, I'm working on an exercise where I'm given a hash function $H$ that takes in an input string $x$. I'm supposed to construct a distinguisher that proves $H$ isn't collision-...
HughJass24's user avatar
0 votes
0 answers
60 views

In this question on sha1(known_prefix + user_input + backend_secret), an answer states that is realistically possible to find the first few bytes of ...
wjwrpoyob's user avatar
  • 101

15 30 50 per page