Title :
Hash pile ups: Using collisions to identify unknown hash functions
Author :
Tobin, R. Joshua ; Malone, David
Author_Institution :
Sch. of Math., Trinity Coll. Dublin, Dublin, Ireland
Abstract :
Hash functions are often used to consistently assign objects to particular resources, for example to load balancing in networks. These functions can be randomly selected from a family, to prevent attackers generating many colliding objects, which usually results in poor performance. We describe a number of attacks allowing us to identify which hash function from a family is being used by observing a relatively small number of collisions. This knowledge can then be used to generate a large number of colliding inputs. In particular we detail attacks against small families of hashes, Pearson-like hash functions and linear hashes, such as the Toeplitz hash used in Microsoft´s Receive Side Scaling.
Keywords :
computer network security; cryptography; resource allocation; statistical analysis; Microsoft Receive Side Scaling; Pearson-like hash functions; Toeplitz hash; attack prevention; colliding object generation; hash piles; linear hashes; load balancing; unknown hash function identification; Educational institutions; Electronic mail; Load management; Probes; Servers; Time factors; Timing;
Conference_Titel :
Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on
Conference_Location :
Cork
Print_ISBN :
978-1-4673-3087-9
Electronic_ISBN :
978-1-4673-3088-6
DOI :
10.1109/CRISIS.2012.6378946