Weaknesses in the HAS-V Compression Function
نویسندگان
چکیده
HAS-V is a cryptographic hash function which processes 1024-bit message blocks and produces a hash value of variable length. The design of the hash function is based on design principles of the MD4 family. Recently, weaknesses have been shown in members of this family. Therefore, the analysis of the HAS-V hash function is of great interest. To the best of our knowledge this is the first article that investigates the security of the HAS-V hash function. In this article, we point out several structural weaknesses in HAS-V which lead to pseudo-collision attacks on HAS-V with tailored output. Furthermore, we show that (second) preimages can be found for HAS-V with a complexity of about 2 hash computations.
منابع مشابه
Diagnosis of thromboembolic disease: Combined ventilation perfusion lung scan and compression ultrasonography
The clinical management of pulmonary embolism and deep venous thrombosis of the legs are similar and requires prolonged anticoagulation therapy. The standard diagnostic approach in patients suspected of pulmonary embolism is ventilation-perfusion (V/Q) lung scan and compression ultrasonography to detect deep venous thrombosis. This retrospective study analyzed the role of V/Q lung scan an...
متن کاملفشرده سازی اطلاعات متغیر با زمان با استفاده از کد هافمن
Abstract: In this paper, we fit a function on probability density curve representing an information stream using artificial neural network . This methodology result is a specific function which represent a memorize able probability density curve . we then use the resulting function for information compression by Huffman algorithm . the difference between the proposed me then with the general me...
متن کاملAssessment of Weighting Functions Used in Oppermann Codes in Polyphase Pulse Compression Radars
Polyphase is a common class of pulse compression waveforms in the radar systems. Oppermann code is one of the used codes with polyphone pattern. After compression, this code has little tolerant against Doppler shift in addition to its high side lobe level. This indicates that the use of Oppermann code is an unsuitable scheme to radars applications. This paper shows that the use of amplitude wei...
متن کاملامکانسنجی استفاده از مبدل بازیاب حرارت در سیکل تبرید تراکمی بخار با آنالیز ترمودینامیکی، انتقال حرارت و اقتصادی
Usually, it is common to use the internal heat exchanger subcooler-superheater after the condenser and before the expansion valve in the compression refrigeration cycles. In this study, the effect of the heat exchanger is evaluated by using recovery heat exchanger after the compressor and before the condenser. To this end, the vapor compression refrigeration cycle with conventional heat exchang...
متن کاملCo-Roman domination in trees
Abstract: Let G=(V,E) be a graph and let f:V(G)→{0,1,2} be a function. A vertex v is protected with respect to f, if f(v)>0 or f(v)=0 and v is adjacent to a vertex of positive weight. The function f is a co-Roman dominating function, abbreviated CRDF if: (i) every vertex in V is protected, and (ii) each u∈V with positive weight has a neighbor v∈V with f(v)=0 such that the func...
متن کامل