Attacks

What are the attacks against cryptographic hash functions ?

Many attacks exist to try to break cryptographic hash functions. Some of them can successfully break a hash function, others are currently technically impossible to accomplish.

Hash functions have many security application, they are used to make digital signature and many other forms of authentication. Meaning it is important to check if the functions are secured and to check if new attacks are realeased. There are many attacks on cryptographic systems and it would be probably impossible to list them all, however some of them are quite famous.

I . The types of attacks on hash Algorithm

There are 3 types of attacks on hash functions:

  • The collisions attack
  • The pre-image attacks
  • The second pre-image attacks
  • Length extension attack

Each of these attacks are usually specific to one type of hash function.