This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 123 lines
!!! Overview
[{$pagename}] is a [Cryptographic Collision] type of [attack] and a cousin to the [Birthday Attacks]
[{$pagename}] is done by the [Attacker] choosing 2%%sup 32%% different 64-[bit] [keys] at [random]. He then computes the [Message Authentication Code] on the β€˜β€˜Are you ready to receive a transaction?’’ [message], and stores both the [MAC] result and the [key] in a table.
The [Attacker] then [eavesdrops|Eavesdropper] on each transaction and checks if the [MAC] of the first message appears in his table. If the [MAC] does appear in the table, then there is a very good chance that the [authentication] [key] for that transaction is the same key as the attacker used to compute that table entry, and that [key] value is stored right alongside the [MAC] value in the table. Now that the [attacker] knows the [authentication] [key], he can insert arbitrary [messages] of his choosing into the transaction. (The [Birthday Attack] only allowed him to insert [messages] from an old transaction.)
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]