Articles Blog | G5 Cyber Security

Research – Transferable State Attack On Iterated Hashing Functions

This paper describes an attack of the iterated use of hashing functions used as key stretching algorithms where the state of a hash can be transferred to the next hash function.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/115079/TransferableStateAttackonIteratedHashingFunctions.pdf

Source: https://packetstormsecurity.com/files/115079/Transferable-State-Attack-On-Iterated-Hashing-Functions.html

Exit mobile version