A Symbolic Intruder Model for Hash-Collision Attacks - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2006

A Symbolic Intruder Model for Hash-Collision Attacks

Résumé

In the recent years, several practical methods have been published to compute collisions on some commonly used hash functions. In this paper we present a method to take into account, at the symbolic level, that an intruder actively attacking a protocol execution may use these collision algorithms in reasonable time during the attack. Our decision procedure relies on the reduction of constraint solving for an intruder exploiting the collision properties of hush functions to constraint solving for an intruder operating on words.
Fichier principal
Vignette du fichier
main.pdf (250.47 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-00116845 , version 1 (28-11-2006)

Identifiants

Citer

Yannick Chevalier, Mounira Kourjieh. A Symbolic Intruder Model for Hash-Collision Attacks. CSTVA'06, Sep 2006, Nantes, France. ⟨hal-00116845⟩
81 Consultations
118 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More