News and advice from RSA Laboratories Bulletin
نویسنده
چکیده
Recent cryptanalytic results on the properties of three popular hash functions have raised questions about their security. This note summarizes these results, gives our assessment of their implications and offers our recommendations for product planners and developers who may be using these algorithms. 1. Introduction A hash function (or more accurately a cryptographic hash function or message-digest algorithm) operates on an input string of arbitrary length and generates an output string of fixed length. This output is commonly called a hash value or a message digest. While much of the motivation for the design of a hash function comes from its usefulness in optimizing the process of digitally signing some document, hash functions can be used for a wide range of purposes.
منابع مشابه
RSA Laboratories Bulletin #5
This bulletin describes a recently devised attack on PKCS #1 v1.5, the RSA Encryption Standard [3]. This attack affects only the digital envelope portion of PKCS #1. In the following sections we describe the digital enveloping method in PKCS #1 and the new attack. We also describe a variety of countermeasures that successfully thwart the attack, in particular, we describe the countermeasure to ...
متن کاملPublic Key Cryptography Standards: PKCS
Cryptographic standards serve two important goals: making different implementations interoperable and avoiding various known pitfalls in commonly used schemes. This chapter discusses Public-Key Cryptography Standards (PKCS) which have significant impact on the use of public key cryptography in practice. PKCS standards are a set of standards, called PKCS #1 through #15. These standards cover RSA...
متن کاملA Cross-Cultural Pragmatic Study of Indirect Complaint Responses in Iranian and American News Interviews: Iran’s Nuclear Negotiations
The present study intended to compare the complaint responses used by President Rouhani and President Obama in the Iranian and US news interview contexts. For this purpose, Boxer’s (1993) six types of indirect complaint responses were adopted: ‘ignorance’, ‘questions’, ‘topic switch’, ‘contradiction’, ‘joke/teasing’, ‘advice/lecture’ and ‘agreement/commiseration’. The transcripts of the live ne...
متن کاملA Cross-Cultural Pragmatic Study of Indirect Complaint Responses in Iranian and American News Interviews: Iran’s Nuclear Negotiations
The present study intended to compare the complaint responses used by President Rouhani and President Obama in the Iranian and US news interview contexts. For this purpose, Boxer’s (1993) six types of indirect complaint responses were adopted: ‘ignorance’, ‘questions’, ‘topic switch’, ‘contradiction’, ‘joke/teasing’, ‘advice/lecture’ and ‘agreement/commiseration’. The transcripts of the live ne...
متن کاملEscherichia coli and Staphylococcus aureus: bad news and good news from the European Antimicrobial Resistance Surveillance Network (EARS-Net, formerly EARSS), 2002 to 2009.
Based on data collected by the European Antimicrobial Resistance Surveillance Network (EARS-Net) and the former EARSS, the present study describes the trends in antimicrobial susceptibility patterns and occurrence of invasive infections caused by Escherichia coli and Staphylococcus aureus in the period from 2002 to 2009. Antimicrobial susceptibility results from 198 laboratories in 22 European ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996