added Category:Women mathematicians using HotCat |
m ce |
||
Line 4: | Line 4: | ||
At the rump session of [[CRYPTO]] 2004, she and co-authors demonstrated [[collision attack]]s against [[MD5]], [[SHA-0]] and other related hash functions. (A collision occurs when two distinct messages result in the same hash function output). They received a standing ovation for their work.<ref>{{citation|url=http://www.emc.com/emc-plus/rsa-labs/historical/collisions-but-sha1-secure.htm|title=Hash Function Update Due to Potential Weaknesses Found in SHA-1|publisher=[[RSA Laboratories]]|date=March 11, 2005|first=James|last=Randall|accessdate=2015-07-21}}.</ref> |
At the rump session of [[CRYPTO]] 2004, she and co-authors demonstrated [[collision attack]]s against [[MD5]], [[SHA-0]] and other related hash functions. (A collision occurs when two distinct messages result in the same hash function output). They received a standing ovation for their work.<ref>{{citation|url=http://www.emc.com/emc-plus/rsa-labs/historical/collisions-but-sha1-secure.htm|title=Hash Function Update Due to Potential Weaknesses Found in SHA-1|publisher=[[RSA Laboratories]]|date=March 11, 2005|first=James|last=Randall|accessdate=2015-07-21}}.</ref> |
||
In February 2005 it was reported that Wang and co-authors had found a method to find collisions in the [[SHA-1]] [[hash function]], which is used in many of today's mainstream security products.<ref>{{citation|url=http://www.theepochtimes.com/news/7-1-11/50336.html |title=Chinese Professor Cracks Fifth Data Security Algorithm |newspaper=[[The Epoch Times]] |date=January 11, 2007 |deadurl=yes |archiveurl=https://web.archive.org/web/20150115033337/http://www.theepochtimes.com/news/7-1-11/50336.html |archivedate=January 15, 2015 }}.</ref> Their attack is estimated to require less than 2<sup>69</sup> operations, far fewer than the 2<sup>80</sup> operations previously thought needed to find a collision in SHA-1. Their work was published at the CRYPTO '05 conference. In August 2005, an improved attack on SHA-1, discovered by |
In February 2005 it was reported that Wang and co-authors had found a method to find collisions in the [[SHA-1]] [[hash function]], which is used in many of today's mainstream security products.<ref>{{citation|url=http://www.theepochtimes.com/news/7-1-11/50336.html |title=Chinese Professor Cracks Fifth Data Security Algorithm |newspaper=[[The Epoch Times]] |date=January 11, 2007 |deadurl=yes |archiveurl=https://web.archive.org/web/20150115033337/http://www.theepochtimes.com/news/7-1-11/50336.html |archivedate=January 15, 2015 }}.</ref> Their attack is estimated to require less than 2<sup>69</sup> operations, far fewer than the 2<sup>80</sup> operations previously thought needed to find a collision in SHA-1. Their work was published at the CRYPTO '05 conference. In August 2005, an improved attack on SHA-1, discovered by Wang, [[Andrew Yao]] and [[Frances Yao]], was announced at the [[CRYPTO]] conference rump session. The time complexity of the new attack is claimed to be 2<sup>63</sup>.<ref>{{citation|first=John|last=Leyden|title=SHA-1 compromised further: Crypto researchers point the way to feasible attack|journal=[[The Register]]|date= August 19, 2005|url=https://www.theregister.co.uk/2005/08/19/sha-1_attack/}}.</ref> |
||
Wang was born in [[Zhucheng]], [[Shandong Province]]. She gained bachelor (1987), master (1990) and doctorate (1993) degrees at [[Shandong University]], and subsequently lectured in the [[mathematics]] department from 1993.<ref name="tan kah kee">[http://www.tsaf.ac.cn/english/awarders/year/2006/1401.html Tan Kah Kee Award in Information Technological Sciences], Tan Kah Kee Science Award Foundation, 2006, retrieved 2015-07-21.</ref> Her doctoral advisor was [[Pan Chengdong]].<ref>{{MathGenealogy|id=134260}}</ref> Wang was appointed assistant professor in 1995, and full professor in 2001. She became the [[Chen Ning Yang]] Professor of the [[Center for Advanced Study, Tsinghua University]] in 2005.<ref name="tan kah kee"/> |
Wang was born in [[Zhucheng]], [[Shandong Province]]. She gained bachelor (1987), master (1990) and doctorate (1993) degrees at [[Shandong University]], and subsequently lectured in the [[mathematics]] department from 1993.<ref name="tan kah kee">[http://www.tsaf.ac.cn/english/awarders/year/2006/1401.html Tan Kah Kee Award in Information Technological Sciences], Tan Kah Kee Science Award Foundation, 2006, retrieved 2015-07-21.</ref> Her doctoral advisor was [[Pan Chengdong]].<ref>{{MathGenealogy|id=134260}}</ref> Wang was appointed assistant professor in 1995, and full professor in 2001. She became the [[Chen Ning Yang]] Professor of the [[Center for Advanced Study, Tsinghua University]] in 2005.<ref name="tan kah kee"/> |
Revision as of 20:02, 26 November 2018
Template:Chinese name Wang Xiaoyun (simplified Chinese: 王小云; traditional Chinese: 王小雲; pinyin: Wáng Xiǎoyún; born 1966) is a Chinese cryptographer and computer scientist. She is a professor in the Department of Mathematics and System Science of Shandong University, China.[1]
At the rump session of CRYPTO 2004, she and co-authors demonstrated collision attacks against MD5, SHA-0 and other related hash functions. (A collision occurs when two distinct messages result in the same hash function output). They received a standing ovation for their work.[2]
In February 2005 it was reported that Wang and co-authors had found a method to find collisions in the SHA-1 hash function, which is used in many of today's mainstream security products.[3] Their attack is estimated to require less than 269 operations, far fewer than the 280 operations previously thought needed to find a collision in SHA-1. Their work was published at the CRYPTO '05 conference. In August 2005, an improved attack on SHA-1, discovered by Wang, Andrew Yao and Frances Yao, was announced at the CRYPTO conference rump session. The time complexity of the new attack is claimed to be 263.[4]
Wang was born in Zhucheng, Shandong Province. She gained bachelor (1987), master (1990) and doctorate (1993) degrees at Shandong University, and subsequently lectured in the mathematics department from 1993.[5] Her doctoral advisor was Pan Chengdong.[6] Wang was appointed assistant professor in 1995, and full professor in 2001. She became the Chen Ning Yang Professor of the Center for Advanced Study, Tsinghua University in 2005.[5]
References
- ^ Key Lab of Cryptologic Technology and Information Security, Shandong University, retrieved 2015-07-21.
- ^ Randall, James (March 11, 2005), Hash Function Update Due to Potential Weaknesses Found in SHA-1, RSA Laboratories, retrieved 2015-07-21.
- ^ "Chinese Professor Cracks Fifth Data Security Algorithm", The Epoch Times, January 11, 2007, archived from the original on January 15, 2015
{{citation}}
: Unknown parameter|deadurl=
ignored (|url-status=
suggested) (help). - ^ Leyden, John (August 19, 2005), "SHA-1 compromised further: Crypto researchers point the way to feasible attack", The Register.
- ^ a b Tan Kah Kee Award in Information Technological Sciences, Tan Kah Kee Science Award Foundation, 2006, retrieved 2015-07-21.
- ^ Wang Xiaoyun at the Mathematics Genealogy Project