Birthday Attack on Cryptography Applications

Authors

  • Keyur Patel Asst. Prof. Department of Information Technology, Sigma Institute of Engineering
  • Digvijaysinh Mahida Asst. Prof. Department of Information Technology, Sigma Institute of Engineering

Keywords:

Birthday Paradox, Hash Function, Cryptography Algorithm, Application.

Abstract

In many network communications it is crucial to be able to authenticate both the contents and the origin of a message.
This paper will study in detail the problem known in probability theory as the Birthday Paradox (or the Birthday problem), as well as
its implications and different related aspects we consider relevant. The Birthday attack makes use of what’s known as the
Birthday paradox to try to attack cryptographic hash functions. Among other desirable properties of hash functions, an interesting
one is that it should be collision-resistant, that is it should be difficult to find two messages with the same hash value. To find a
collision the birthday attack is used, which shows that attacker may not need to examine too many messages before he finds a
collision. The purpose of this paper is thus to give the reader a general overview of the general aspects and applications of the
Birthday Paradox.

Published

2022-08-23

How to Cite

Keyur Patel, & Digvijaysinh Mahida. (2022). Birthday Attack on Cryptography Applications. International Journal of Advance Engineering and Research Development (IJAERD), 4(13), -. Retrieved from https://www.ijaerd.org/index.php/IJAERD/article/view/5967