Unlimited WordPress themes, plugins & video downloads!

Research

Research – Transferable State Attack On Iterated Hashing Functions

This paper describes an attack of the iterated use of hashing functions used as key stretching algorithms where the state of a hash can be transferred to the next hash function.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/115079/TransferableStateAttackonIteratedHashingFunctions.pdf

Source: https://packetstormsecurity.com/files/115079/Transferable-State-Attack-On-Iterated-Hashing-Functions.html

Related posts
Research

Research - trans.txt

Research

Research - Troopers 2013 Call For Papers

Research

Research - Ubuntu OverlayFS Local Privilege Escalation

Research

Research - Understanding SQL Injection

Sign up for our Newsletter and
stay informed