Abstract
This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his method are studied and possible solutions are given. Some secure methods that require additional assumptions are also suggested.
Original language | English |
---|---|
Pages (from-to) | 185-196 |
Number of pages | 12 |
Journal | Journal of Universal Computer Science |
Volume | 3 |
Issue number | 3 |
Publication status | Published - 1997 |
Externally published | Yes |
Keywords
- Collisionful hash functions
- Guessing attack
- Message authentication
- Safety/security in digital systems