Paper Abstract and Keywords |
Presentation |
2011-03-04 09:10
A Consideration of Security Risk in Compromising Hash Function
-- An Exposure of Vulnerability against Information Storage System -- Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Lifelog and office information systems store processing data. Because these systems process data with these stored data, integrity of stored data is very important. A hash function that is the cryptographic algorithm is used for integrity.
On the other hand, a security of a hash function is weakening because of compromising of cryptosystems.
In this paper, we compare the computational complexity of attack against hash function MD5 and SHA-1, and consider attack feasibility and the security risk against practical system. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
Compromising of Cryptosystems / Hash Function / Security Protocols / / / / / |
Reference Info. |
IEICE Tech. Rep., vol. 110, no. 450, LOIS2010-81, pp. 95-100, March 2011. |
Paper # |
LOIS2010-81 |
Date of Issue |
2011-02-24 (LOIS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
LOIS2010-81 |
|