JUCS - Journal of Universal Computer Science 3(3): 185-196, doi: 10.3217/jucs-003-03-0185
On the Weaknesses of Gong's Collisionful Hash Function
S. Bakhtiari‡,
Reihaneh Safavi-Naini§,
Josef Pieprzyk‡‡ Centre for Computer Security Research, University of Wollongong, Australia§ Centre for Computer Security Research, University of Wollongong, Wollongong, Australia
Corresponding author:
S. Bakhtiari
(
shahram@cs.uow.eud.au
)
© S. Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk. Citation:
Bakhtiari S, Safavi-Naini R, Pieprzyk J (1997) On the Weaknesses of Gong's Collisionful Hash Function. JUCS - Journal of Universal Computer Science 3(3): 185-196. https://doi.org/10.3217/jucs-003-03-0185 | ![Open Access](/i/open_access_icon_colour.svg) |
AbstractThis paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his method are studied and possible solutions are given. Some secure methods that require additional assumptions are also suggested.