Para acceder a los documentos con el texto completo, por favor, siga el siguiente enlace: http://hdl.handle.net/2117/24604
dc.contributor | Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors |
---|---|
dc.contributor | Universitat Politècnica de Catalunya. CAP - Grup de Computació d'Altes Prestacions |
dc.contributor.author | Cilardo, Alessandro |
dc.contributor.author | Esposito, Luigi |
dc.contributor.author | Veniero, Antonio |
dc.contributor.author | Mazzeo, Antonino |
dc.contributor.author | Beltran Querol, Vicenç |
dc.contributor.author | Ayguadé Parra, Eduard |
dc.date | 2010 |
dc.identifier.citation | Cilardo, A. [et al.]. A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions. A: IEEE International Conference on High Performance Computing and Communications. "2010 12th IEEE international conference on high performance computing and communications: HPCC 2010: 1-3 September 2010, Melbourne, Australia: proceedings". Melbourne: 2010, p. 450-457. |
dc.identifier.citation | 978-0-7695-4214-0 |
dc.identifier.citation | 10.1109/HPCC.2010.113 |
dc.identifier.uri | http://hdl.handle.net/2117/24604 |
dc.description.abstract | After some recent breaks presented in the technical literature, it has become of paramount importance to gain a deeper understanding of the robustness and weaknesses of cryptographic hash functions. In particular, in the light of the recent attacks to the MD5 hash function, SHA-1 remains currently the only function that can be used in practice, since it is the only alternative to MD5 in many security standards. This work presents a study of vulnerabilities in the SHA family, namely the SHA-0 and SHA-1 hash functions, based on a high-performance computing application run on the MariCel cluster available at the Barcelona Supercomputing Center. The effectiveness of the different optimizations and search strategies that have been used is validated by a comprehensive set of quantitative evaluations, presented in the paper. Most importantly, at the conclusion of our study, we were able to identify an actual collision for a 71-round version of SHA-1, the first ever found so far. |
dc.description.abstract | Peer Reviewed |
dc.language.iso | eng |
dc.relation | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=5581445&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5581445 |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights | info:eu-repo/semantics/openAccess |
dc.rights | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia |
dc.subject | Àrees temàtiques de la UPC::Enginyeria de la telecomunicació |
dc.subject | Cryptography |
dc.subject | Computer security |
dc.subject | Cryptography |
dc.subject | Optimisation |
dc.subject | Search problems |
dc.subject | Barcelona supercomputing center |
dc.subject | CellBE |
dc.subject | HPC application |
dc.subject | MD5 hash function |
dc.subject | MariCel cluster |
dc.subject | SHA-1 |
dc.subject | Cryptographic hash functions |
dc.subject | Optimizations |
dc.subject | Search strategies |
dc.subject | Criptografia |
dc.subject | Seguretat informàtica |
dc.title | A CellBE-based HPC application for the analysis of vulnerabilities in cryptographic hash functions |
dc.type | info:eu-repo/semantics/publishedVersion |
dc.type | info:eu-repo/semantics/conferenceObject |