Abstract
Keyless hash functions are one of the most important cryptographic primitives and are used in modern encryption, authentication, digital signature, keys generation systems, etc. Although conspicuous progress in developing of various attacks on specific hash functions, understanding of the principles underlying these attacks, determining the conditions of their applicability, and development of methods for their performance estimating is an active subject of further research. The goal of this paper is to establish the general conditions of practical security for a broad class of hash functions based on shift registers against collision search attacks on their compression functions. It is shown that the problem of building of collisions can be reduced to solving some automaton equations with binary unknowns satisfying certain constraints. Then the set of all solutions of these equations (without constraints) have simple algorithmic description that allows to enumerate these solutions in the real time-mode.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have