Improved Algorithms for Generic Attacks on Cryptographic Hash Functions
They are also used for numerous applications in cyber security, for example for signing messages, applications, and software updates. One of the main methods of comparison between strategies for designing hash functions is generic attacks. While usually non-practical, attacks of this type point at a structural weakness in a design strategy, and may make us prefer a more conservative (or just a different) design. Numerous generic attacks were presented in recent years. This research project aims at improving the existing algorithms for generic attacks on hash functions, and (more ambitiously) at devising new such algorithms.