Long-lived digital integrity using short-lived hash functions

نویسنده

  • Stuart Haber
چکیده

New collision-finding attacks on widely used cryptographic hash functions raise questions about systems that depend on certain properties of these functions for their security. Even after new and presumably better hash functions are deployed, users may have digital signatures and digital time-stamp certificates that were computed with recently deprecated hash functions. Is there any way to use a new and currently unassailable hash function to buttress the security of an old signature or time-stamp certificate? The main purpose of this note is to remind the technical community of a simple solution to this problem that was published more than a decade ago.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A content integrity service for digital repositories

© A content integrity service for digital repositories Stuart Haber, Pandurang Kamat, Kiran Kamineni HP Laboratories HPL-2008-177 integrity, longevity, archive, repository We present a "content integrity service" for long-lived digital documents, especially for objects stored in digital repositories. The goal of the service is to demonstrate that information in the repository is authentic and h...

متن کامل

A Content Integrity Service For Long-Term Digital Archives

We present a content integrity service for long-lived digital documents, especially for objects stored in long-term digital archives. The goal of the service is to demonstrate that information in the archive is authentic and has not been unintentionally or maliciously altered, even after its bit representation in the archive has undergone one or more transformations. We describe our design for ...

متن کامل

To Appear in Infocom 2005 TCP vs. TCP: a Systematic Study of Adverse Impact of Short-lived TCP Flows on Long-lived TCP Flows

While earlier studies have pointed out that short-lived TCP flows (mice) may hurt long-lived TCP flows (elephants) in the long term, they provide insufficient insight for developing scenarios leading to drastic drop in throughputs of long-lived TCP flows. We have systematically developed TCP adversarial scenarios where we use short-lived TCP flows to adversely influence long-lived TCP flows. Ou...

متن کامل

Vehicle emissions of short-lived and long-lived climate forcers: trends and tradeoffs.

Evaluating technology options to mitigate the climate impacts of road transportation can be challenging, particularly when they involve a tradeoff between long-lived emissions (e.g., carbon dioxide) and short-lived emissions (e.g., methane or black carbon). Here we present trends in short- and long-lived emissions for light- and heavy-duty transport globally and in the U.S., EU, and China over ...

متن کامل

Actively Monitoring Peers in KAD

In recent years, a large number of DHTs have been proposed. However, very few of them have been deployed in real-life large scale systems. An exception is KAD, a DHT based on Kademlia that is part of the widely used eMule peer-to-peer system, which has more than 1.5 million simultaneous users. We have developed a very fast crawler and explored KAD for more than a month by crawling part of the K...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2007  شماره 

صفحات  -

تاریخ انتشار 2007