Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/23871
DC FieldValueLanguage
dc.contributor.authorMarkovski, Smileen_US
dc.contributor.authorMileva, Aleksandraen_US
dc.contributor.authorDimitrova, Vesnaen_US
dc.contributor.authorGligoroski, Daniloen_US
dc.date.accessioned2022-10-27T12:54:22Z-
dc.date.available2022-10-27T12:54:22Z-
dc.date.issued2009-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/23871-
dc.description.abstractA collision attack on NaSHA-512 was proposed by L. Ji et al. The claimed complexity of the attack is 2192. The proposed attack is realized by using a suitable differential pattern. In this note we show that the correct result that can be inferred from their differential pattern is in fact a conditional one. It can be stated correctly as follows: A collision attack on NaSHA-512 of complexity k = 1, 2, . . . , 2 320 can be performed with an unknown probability of success pk, where 0 ≤ p1 ≤ p2 ≤ p2 320 ≤ 1. Consequently, the attack proposed by L. Ji et al. can be considered only as a direction how a possible collision attack on NaSHA-512 could be realized. The birthday attack remains the best possible attack on NaSHA-512.en_US
dc.relation.ispartofCryptology ePrint Archiveen_US
dc.titleOn a conditional collision attack on nasha-512en_US
dc.typeJournal Articleen_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
crisitem.author.deptFaculty of Computer Science and Engineering-
crisitem.author.deptFaculty of Natural Sciences and Mathematics-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Journal Articles
Files in This Item:
File Description SizeFormat 
2009-034.pdf131.32 kBAdobe PDFView/Open
Show simple item record

Page view(s)

52
checked on Jul 24, 2024

Download(s)

5
checked on Jul 24, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.