
Optimizing Hash Strategy to Avoid Birthday Attack
Author(s) -
Yiou Zhao
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1486/3/032004
Subject(s) - hash function , computer science , collision attack , magic (telescope) , hash chain , computer security , cryptographic hash function , double hashing , physics , quantum mechanics
It is necessary to optimize hash codes to prevent birthday attacks. First of all, it is necessary to know what hash codes are, what birthday attacks are, and how to attack them. In this article, there are two ways to avoid birthday attacks: enlarge hash space andselection of magic number. After the implementation of different code and different magic number selection, the most stable and secure one will be chosen.