FSBday: Implementing Wagner's generalized birthday attack against the SHA-3 round-1 candidate FSB

13Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper applies generalized birthday attacks to the FSB compression function, and shows how to adapt the attacks so that they run in far less memory. In particular, this paper presents details of a parallel implementation attacking FSB48, a scaled-down version of FSB proposed by the FSB submitters. The implementation runs on a cluster of 8 PCs, each with only 8GB of RAM and 700GB of disk. This situation is very interesting for estimating the security of systems against distributed attacks using contributed off-the-shelf PCs. © 2009 Springer-Verlag.

Cite

CITATION STYLE

APA

Bernstein, D. J., Lange, T., Niederhagen, R., Peters, C., & Schwabe, P. (2009). FSBday: Implementing Wagner’s generalized birthday attack against the SHA-3 round-1 candidate FSB. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5922 LNCS, pp. 18–38). https://doi.org/10.1007/978-3-642-10628-6_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free