Quantifying the strength of hash functions |
| Abstract | In an estimate made by Bruce Schneier, it is predicted that the SHA-1 Hash algorithm will be cryptographically broken within the year 2018. This has will have a huge impact on the security infrastructure used today as SHA-1 is used extensively in many areas.
The report will outline the major areas where SHA-1 is used and offer a risk analysis based on theoretical models, previous examples and a practical implementation on a high performance computing cluster, and while no concrete, working attacks were produced, the hardware capabilities of the current generation were demonstrated, and used to reinforce the point, that 2nd pre-image attacks on SHA-1 are still not possible. | Type | Master's thesis [Academic thesis] | Year | 2017 | Publisher | Technical University of Denmark, Department of Applied Mathematics and Computer Science | Address | Richard Petersens Plads, Building 324, DK-2800 Kgs. Lyngby, Denmark, compute@compute.dtu.dk | Series | DTU Compute M.Sc.-2016 | Note | DTU supervisor: Christian D. Jensen, cdje@dtu.dk, DTU Compute | Electronic version(s) | [pdf] | Publication link | http://www.compute.dtu.dk/english | BibTeX data | [bibtex] | IMM Group(s) | Computer Science & Engineering |
|