z-logo
open-access-imgOpen Access
Modern Hash Collision CyberAttacks and Methods of Their Detection and Neutralization
Author(s) -
Olga Safaryan,
Larissa V. Cherckesova,
Nikita G. Lyashenko,
Pavel Razumov,
Vladislav Chumakov,
Boris Akishin,
Andrey G. Lobodenko
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/2131/2/022099
Subject(s) - hash function , sha 2 , computer science , secure hash algorithm , md5 , hash chain , collision resistance , cryptographic hash function , collision attack , double hashing , collision , computer security
This article discusses the issues related to the possibility of realization of collision cyberattacks (based on hash collisions). Since post–quantum cryptography has become relevant, classical cryptosystems do not provide the sufficient resistance to the modern quantum cyberattacks. Systems based on outdated hashing algorithms become vulnerable to cyberattacks with hash collision. As replacement for unreliable algorithms, such as various modifications of MD5 and SHA–1, new algorithms have been created, for example, SHA–3 standard based on the Keccak function and AES–based hashing. This article discusses modern collision cyberattacks and possible methods of their detection. Because of this study, theoretical description of cyberattacks with hash collision was considered; modern cyberattacks on hash collisions and possible ways of detecting and countering them (weak hash detection) are described; software tool that detects vulnerable and unreliable hash is implemented; software testing is carried out. Based on the conducted research, it can be concluded that the main advantages of implementing software tool are effective detection of vulnerable hash, the ability to generate new hash protected from collisions, convenient and user– friendly interface, small memory requirements and small size of the program code.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here