The need for security in electronic communications is crucial in todays world. The foundation for providing this security rests on mathematics. In particular, a certain kind of mathematical function called a "hash function" is central in the design of cryptographic systems that protect electronic communications. But recently the most secure hash function in use today was shown to be vulnerable to attack. An article in the upcoming issue of the Notices of the AMS describes these attacks and sends out a call for a new mathematical theory to undergird future communications security systems.
A hash function is an easy-to-compute compression function that takes as input any string of computer bits and distills that string down to a fixed-length output string: Whether the input is an 8-character password or a 100-page document, the hash function outputs a string of a fixed length. An important feature of hash functions is that they must be hard---or at least computationally too expensive---to invert. So, for example, it should be hard, given the hash of a password, to recover the password itself.
One researcher calls hash functions the "duct tape" of cryptography because they are used everywhere for many different purposes: to authenticate messages, to ascertain software integrity, to create one-time passwords, and to support Internet communication protocols. The very ubiquity of hash functions makes any vulnerability found in them a widespread concern.
Dr. Susan Landau | EurekAlert!
Five developments for improved data exploitation
19.04.2017 | Deutsches Forschungszentrum für Künstliche Intelligenz GmbH, DFKI
Smart Manual Workstations Deliver More Flexible Production
04.04.2017 | Deutsches Forschungszentrum für Künstliche Intelligenz GmbH, DFKI
The nearby, giant radio galaxy M87 hosts a supermassive black hole (BH) and is well-known for its bright jet dominating the spectrum over ten orders of magnitude in frequency. Due to its proximity, jet prominence, and the large black hole mass, M87 is the best laboratory for investigating the formation, acceleration, and collimation of relativistic jets. A research team led by Silke Britzen from the Max Planck Institute for Radio Astronomy in Bonn, Germany, has found strong indication for turbulent processes connecting the accretion disk and the jet of that galaxy providing insights into the longstanding problem of the origin of astrophysical jets.
Supermassive black holes form some of the most enigmatic phenomena in astrophysics. Their enormous energy output is supposed to be generated by the...
The probability to find a certain number of photons inside a laser pulse usually corresponds to a classical distribution of independent events, the so-called...
Microprocessors based on atomically thin materials hold the promise of the evolution of traditional processors as well as new applications in the field of flexible electronics. Now, a TU Wien research team led by Thomas Müller has made a breakthrough in this field as part of an ongoing research project.
Two-dimensional materials, or 2D materials for short, are extremely versatile, although – or often more precisely because – they are made up of just one or a...
Two researchers at Heidelberg University have developed a model system that enables a better understanding of the processes in a quantum-physical experiment...
Glaciers might seem rather inhospitable environments. However, they are home to a diverse and vibrant microbial community. It’s becoming increasingly clear that they play a bigger role in the carbon cycle than previously thought.
A new study, now published in the journal Nature Geoscience, shows how microbial communities in melting glaciers contribute to the Earth’s carbon cycle, a...
20.04.2017 | Event News
18.04.2017 | Event News
03.04.2017 | Event News
24.04.2017 | Trade Fair News
21.04.2017 | Physics and Astronomy
21.04.2017 | Health and Medicine