Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
Hash functions play an important role in information technology. They are incorporated in many security protocols and security-critical applications and ensure essential security properties for the overall systems. To verify their current status of security, hash functions are regularly exposed to new attacks from the scientific community. Almost all of these attacks are executed on standard PCs. However, the relevance of such attacks is limited: real attackers are not confined to the use of standard PCs. Instead they could develop specialized hardware that executes attacks much faster or cost-efficient. In this book we examine which alternative hardware technologies are suited for developing specialized architectures for the execution of attacks on hash functions. As a proof-of-concept, we develop a very cost-efficient microprocessor with a specialized instruction set and corresponding assembler software. Based on this, we implement a full hardware unit to search for collisions in hash functions. We show that executing attacks on our architecture is, given a fixed amount of money, multiple times faster than on standard PCs.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
Hash functions play an important role in information technology. They are incorporated in many security protocols and security-critical applications and ensure essential security properties for the overall systems. To verify their current status of security, hash functions are regularly exposed to new attacks from the scientific community. Almost all of these attacks are executed on standard PCs. However, the relevance of such attacks is limited: real attackers are not confined to the use of standard PCs. Instead they could develop specialized hardware that executes attacks much faster or cost-efficient. In this book we examine which alternative hardware technologies are suited for developing specialized architectures for the execution of attacks on hash functions. As a proof-of-concept, we develop a very cost-efficient microprocessor with a specialized instruction set and corresponding assembler software. Based on this, we implement a full hardware unit to search for collisions in hash functions. We show that executing attacks on our architecture is, given a fixed amount of money, multiple times faster than on standard PCs.