Main Menu
Who's Online
5 utilisateur(s) en ligne (dont 3 sur SAPHIR-Downloads)

Membre(s): 0
Invité(s): 5

WFDownloads is developed by The SmartFactory (http://www.smartfactory.ca), a division of InBox Solutions (http://www.inboxsolutions.net)
SAPHIR-Downloads > Projet RNRT SAPHIR-Livrables > L3.3 Impact des attaques en collision sur les applications cryptographiques


L3.3 Impact des attaques en collision sur les applications cryptographiques

Description : 

This report ensues from the Saphir deliverable L3.1. More precisely, this deliverable reports :
– a thorough standard-model investigation on how attacks on hash functions impact the security of hash-and-sign signature schemes. We have analyzed security relations in the general case of hash-and-sign signatures and in the particular case of first-hash-then-sign signatures showing the gap of security guarantees between the two paradigms. Our results have been applied to two operating modes to construct a hash function family from a hash function based on the well-known Merkle-Damgård construction (such as MD5 and SHA-1). These results have been presented at the International Conference on provable security ProvSec 2008.
– some issues related to the long-term archival of documents based on time stamp which uses digital signatures and hash functions. We have considered the storage of arbitrary documents over long period of times (possibly several decades). The issue is to be able to prove to third parties the integrity of stored documents by taking into account the potential obsolescence of the algorithm : a given hash function, believed robust when it was first used, may lose its security over time, due to cryptanalytic advances or sheer increase of available computing power.

Proposé par: admin
Proposé le : Mon, 25-May-2009

Version: 1.0
Téléchargé(s) : 1729
Taille du Fichier (en Octets): 691.93 KB

Note :   (0 votes)

Révisions :  (0)

Miroirs disponibles: 0

Temps de téléchargements :
Modem(56k) : 1.9min
ISDN(64k) : 1.6min
DSL(768k) : 8s
LAN(10M) : 0.63s
Prix: Libre | Plateformes Supportées: None | License: None | Restrictions: None

Projet RNRT SAPHIR Révisions d'utilisateur

Autres fichiers de : admin

L3.3 Impact des attaques en collision sur les applications cryptographiques © copyright 2017 http://www.crypto-hash.fr

Les commentaires appartiennent à leurs auteurs. Nous ne sommes pas responsables de leur contenu.
Fichiers récents