Fix a small, non-empty set of blockcipher keys K. We say a blockcipher-based hash function is highly-efficient if it makes exactly one blockcipher call for each message block hashed, and all blockcipher calls use a key from K. Although a few highly-efficient constructions have been proposed, no one has been able to prove their security. In this paper we… (More)
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wang et al. . To date, however, the method used by researchers in this work has been fairly difficult to grasp. In this paper we conduct a study of all attacks on MD5 starting… (More)
Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of a 2 63 attack by Wang et al., the details of the attack have not yet been presented or verified. This note does just that. Working from Adi Shamir's 2005 CRYPTO rump session presentation of Wang et al.'s work, this note verifies and presents the differential path and… (More)
The Internet Chess Club (ICC) is a popular online chess server that started its existence in the early 1990s as the Internet chess server. Although the ICC Web site assures its users that the security protocol employed between the client and the server protects sensitive information, the authors show that this isn't true. This article examines two security… (More)
Message Authentication Codes (MACs) are a central algorithm deployed in virtually every security protocol in common usage. The integrity and authenticity of messages relies entirely on the security of the MAC; we examine cases in which this security is lost. In this paper, we examine the notion of " reforgeability " for MACs. We first give a definition for… (More)
To quantify the current status of the Cherokee language among CN citizens who live in the jurisdictional service area and to develop a 1O-year plan to increase the use of the language in the home, community and CN work setting.
Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of a 2 63 attack by Wang et al., the details of the attack have not yet been vetted; this note does just that. Working from Adi Shamir's 2005 CRYPTO rump session presentation of Wang et al.'s work, this note corroborates and presents the differential path and associated… (More)
The Internet Chess Club (ICC) is a popular online chess server with more than 30,000 members worldwide including various celebrities and the best chess players in the world. Although the ICC Web site assures its users that the security protocol used between client and server provides sufficient security for sensitive information to be transmitted (such as… (More)