π Breaking hashes CityHash64, MurmurHash2/3, wyhash and more
Hash functions are incredibly beautiful mathematical objects. They can map arbitrary data to a small range of fixed-size output data in such a way that the mapping is deterministic, although it appears random.
In this article, we will look at the dark side of hash functions: situations when things go wrong. The author will also show how very specific pairs of strings can be created that can be concatenated in such a way that when concatenating k strings, any of the 2k combinations will have the same hash regardless of the seed value used for the hash function.
Hash functions are an important tool in the field of information security and cryptography. They are used for hashing passwords, checking data integrity, and many other tasks. However, like any tool, they can have vulnerabilities and weak points.
CityHash64
CityHash64 is one of the popular hash functions used in various applications. It has good performance and reliability. However, as recent research shows, there are methods that can break this hash function.
- One way to attack CityHash64 is to use collisions, specially crafted data that leads to the same hash.
- Researchers have also found vulnerabilities in the CityHash64 algorithm that allow access to protected data.
MurmurHash2/3
MurmurHash2/3 is another popular hash function widely used in various applications. It stands out for its good performance and reliability. However, this algorithm is not without vulnerabilities.
Research shows that MurmurHash2/3 can be vulnerable to attacks based on specially constructed data that alter the output hash.
wyhash
wyhash is a relatively new hash function that is quickly gaining popularity among developers. However, vulnerabilities are also present here.
Recent research shows that wyhash can be susceptible to attacks aimed at compromising data integrity and gaining unauthorized access.
In conclusion, it is worth noting that hash functions, despite their importance and wide application, are not invincible. Research and development in the field of cryptography are ongoing, and it is important to stay informed about the latest trends and vulnerabilities.
Be vigilant and keep up with updates in the field of information security to protect your data from possible attacks.