JUCS - Journal of Universal Computer Science 3(3): 185-196, doi: 10.3217/jucs-003-03-0185
On the Weaknesses of Gong's Collisionful Hash Function
expand article infoS. Bakhtiari, Reihaneh Safavi-Naini§, Josef Pieprzyk
‡ Centre for Computer Security Research, University of Wollongong, Australia§ Centre for Computer Security Research, University of Wollongong, Wollongong, Australia
Open Access
Abstract
This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his method are studied and possible solutions are given. Some secure methods that require additional assumptions are also suggested.