A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH
2016
Proceedings 2016 Network and Distributed System Security Symposium
unpublished
In response to high-profile attacks that exploit hash function collisions, software vendors have started to phase out the use of MD5 and SHA-1 in third-party digital signature applications such as X.509 certificates. However, weak hash constructions continue to be used in various cryptographic constructions within mainstream protocols such as TLS, IKE, and SSH, because practitioners argue that their use in these protocols relies only on second preimage resistance, and hence is unaffected by
doi:10.14722/ndss.2016.23418
fatcat:zvxy46wzbzbjxplfcevzo7tgwy