Abstract. MD2 is an early hash function developed by Ron Rivest for RSA Security, that produces message digests of 128 bits. In this paper, we show that MD2 does not reach the ideal security level of 2 128 . We describe preimage attacks against the underlying compression function, the best of which has complexity of 2 73 . As a result, the full MD2 hash can be attacked in preimage with complexity of 2 104 .
Abstract:In this study, we used a geographic information system (GIS), remote sensing products and a digital elevation model (DEM) to prepare and to test the existing data sources and algorithms for a distributed, physically based, hydrological model, incorporating the gauging stations of the national networks of the Amazon basin. Watershed delineation for the Amazon sub-basin system is a necessary first step in distributed hydrological modelling. The DEMs currently available for the Amazon basin are GTOPO30, which has a grid spacing of about 1 km, and SRTM, which can be freely obtained from the internet at a resolution of about 90 m. Each of these DEMs has different sources and consequently different kinds of uncertainties. We have tested the two DEMs, comparing the results obtained using both of them on different sub-basins within the Amazonian basin. The delineation of the sub-basins for the entire Amazonian basin, which is currently available on our project site (http://www.mpl.ird.fr/hybam/), has been obtained from the GTOPO30. With GTOPO30 alone, the D8 algorithm (which determines the direction of flow in eight neighbouring cells) does not always give the correct delineation of sub-basins corresponding to the gauging stations. This problem occurs mainly in the very flat areas of the region. One way to overcome this problem is to burn-in the DEM with a river network. The spatial precision of this river network must be compatible with that of the DEM, and homogeneous throughout the basin. We tested three river networks on the Negro River sub-basins. We found that a suitable river network could be extracted by digitising a JERS-1 mosaic image. The DEM GTOPO30 burned-in with the JERS-1 extracted river network made the correct distributed modelling of the Amazon gauged sub-basins possible by determining water transfer times within the basin.
Abstract.In this paper, we analyze the security of the stream cipher Helix, recently proposed at FSE'03. Helix is a high-speed asynchronous stream cipher, with a built-in MAC functionality. We analyze the differential properties of its keystream generator and describe two new attacks. The first attack requires 2 88 basic operations and processes only 2
12words of chosen plaintext in order to recover the secret key for any length up to 256 bits. However, it assumes the attacker can force nonces to be used twice. Our second attack relies on weaker assumptions. It is a distinguishing attack that detects internal state collisions after 2 114 words of chosen plaintext.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.