@inproceedings{2d67a669819f4c2c9ab0b45c0bee283a,
title = "Preimage attacks against variants of very smooth hash",
abstract = "In this paper, we show that some new variants of the Very Smooth Hash (VSH) hash function are susceptible to similar types of preimage attacks as the original VSH. We also generalise the previous mathematical results, which have been used in the preimage attacks. VSH is a hash function based on the multiexponentiation of prime numbers modulo some large product of two primes. The security proof of VSH is based on some computational problems in number theory, which are related to the problem of factoring large integers. However, the preimage resistance of VSH has been studied and found somewhat lacking especially in password protection. There have been many different variants of VSH proposed by the original authors and others. Especially the discrete logarithm version of VSH has been proposed in order to make the hash values shorter. Further proposals have used the discrete logarithm in finite fields and elliptic curves to gain even more advantage to the hash length. Our results demonstrate that even for these new variants, the same ideas for preimage attacks can be applied as for the original VSH and they result in effective preimage attacks.",
author = "Kimmo Halunen and Juha R{\"o}ning",
year = "2010",
doi = "10.1007/978-3-642-16825-3_17",
language = "English",
isbn = "978-3-642-16824-6",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "251--266",
editor = "I. Echizen and N. Kunihiro and {Sasaki }, R.",
booktitle = "Advances in Information and Computer Security, IWSEC 2010",
address = "Germany",
note = "5th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2010 ; Conference date: 22-11-2010 Through 24-11-2010",
}