Slide Attacks on a Class of Hash Functions

作者: Michael Gorski , Stefan Lucks , Thomas Peyrin

DOI: 10.1007/978-3-540-89255-7_10

关键词: Cryptographic hash functionHash functionDouble hashingMDC-2Theoretical computer scienceComputer securityCollision resistanceCollision attackSHA-2Hash chainMathematics

摘要: This paper studies the application of slide attacks to hash functions. Slide have mostly been used for block cipher cryptanalysis. But, as shown in current paper, they also form a potential threat functions, namely sponge-function like structures. As it turns out, certain constructions hash-function-based MACs can be vulnerable forgery and even key recovery attacks. In other cases, we at least distinguish given function from random oracle. To illustrate our results, describe against Grindahl -256 -512 To best knowledge, this is first cryptanalytic result on -512. Furthermore, point out slide-based distinguisher attack slightly modified version RadioGatun . We finally discuss simple countermeasures defense

参考文章(32)
Thomas Peyrin, Cryptanalysis of GRINDAHL international conference on the theory and application of cryptology and information security. pp. 551- 567 ,(2007) , 10.1007/978-3-540-76900-2_34
Raphael C. -W. Phan, Advanced Slide Attacks Revisited: Realigning Slide on DES Progress in Cryptology – Mycrypt 2005. pp. 263- 276 ,(2005) , 10.1007/11554868_19
Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya, Merkle-Damgård revisited: how to construct a hash function international cryptology conference. pp. 430- 448 ,(2005) , 10.1007/11535218_26
Eli Biham, New types of cryptanalytic attacks using related keys Journal of Cryptology. ,vol. 7, pp. 229- 246 ,(1994) , 10.1007/BF00203965
Bart Preneel, Paul C. van Oorschot, On the security of two MAC algorithms theory and application of cryptographic techniques. pp. 19- 32 ,(1996) , 10.1007/3-540-68339-9_3
Mihir Bellare, Ran Canetti, Hugo Krawczyk, Keying Hash Functions for Message Authentication international cryptology conference. pp. 1- 15 ,(1996) , 10.1007/3-540-68697-5_1
Alex Biryukov, David Wagner, Advanced slide attacks theory and application of cryptographic techniques. pp. 589- 606 ,(2000) , 10.1007/3-540-45539-6_41
Lars Ramkilde Knudsen, Cryptanalysis of LOKI 91 theory and application of cryptographic techniques. pp. 196- 208 ,(1992) , 10.1007/3-540-57220-1_62
Gilles Van Assche, Joan Daemen, Guido Bertoni, Michaël Peeters, RadioGatún, a belt-and-mill hash function. IACR Cryptology ePrint Archive. ,vol. 2006, pp. 369- ,(2006)