作者
Paul C van Oorschot, Michael J Wiener
发表日期
1999/9/24
期刊
Journal of Cryptology
卷号
12
期号
1
页码范围
1-28
出版商
Springer New York
简介
A simple new technique of parallelizing methods for solving search problems which seek collisions in pseudorandom walks is presented. This technique can be adapted to a wide range of cryptanalytic problems which can be reduced to finding collisions. General constructions are given showing how to adapt the technique to finding discrete logarithms in cyclic groups, finding meaningful collisions in hash functions, and performing meet-in-the-middle attacks such as a known-plaintext attack on double encryption. The new technique greatly extends the reach of practical attacks, providing the most cost-effective means known to date for defeating: the small subgroup used in certain schemes based on discrete logarithms such as Schnorr, DSA, and elliptic curve cryptosystems; hash functions such as MD5, RIPEMD, SHA-1, MDC-2, and MDC-4; and double encryption and three-key triple encryption. The …
引用总数
19981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202441433411224293230333036393550372634483129414458413016
学术搜索中的文章