Abstract
In this paper we present an improvement to the preimage attacks on Very Smooth Hash (VSH) function. VSH was proposed as a collision resistant hash function by Contini et al., but it has been found lacking in preimage resistance by Saarinen. With our method, we show how to find preimages of multiple passwords secured by VSH. We also demonstrate that our method is faster in finding preimages of multiple passwords than the methods proposed earlier. We tested the methods with five, ten and fifty randomised alphanumeric passwords. The results show that our method is many times faster than the original method of Saarinen and almost three times faster than the improved method proposed by Halunen et al. Furthermore, we argue that the methods presented previously and our method are essentially the only significantly different methods derivable from Saarinen's work.
Original language | English |
---|---|
Title of host publication | International Conference on Availability, Reliability and Security, ARES 2009 |
Publisher | IEEE Institute of Electrical and Electronic Engineers |
Pages | 499-503 |
Number of pages | 5 |
ISBN (Electronic) | 978-0-7695-3564-7 |
ISBN (Print) | 978-1-4244-3572-2 |
DOIs | |
Publication status | Published - 12 Oct 2009 |
MoE publication type | Not Eligible |
Event | International Conference on Availability, Reliability and Security, ARES 2009 - Fukuoka, Japan Duration: 16 Mar 2009 → 19 Mar 2009 |
Conference
Conference | International Conference on Availability, Reliability and Security, ARES 2009 |
---|---|
Country/Territory | Japan |
City | Fukuoka |
Period | 16/03/09 → 19/03/09 |
Keywords
- Hash function
- preimage attack
- VSH
- password security