New Attacks on the Concatenation and XOR Hash Combiners

作者: Itai Dinur

DOI: 10.1007/978-3-662-49890-3_19

关键词: Preimage attackMDC-2AlgorithmSHA-2Double hashingCryptographic hash functionCollision resistanceDiscrete mathematicsMathematicsCollision attackHash function

摘要: We study the security of concatenation combiner $$H_1M \Vert H_2M$$H1Mi¾?H2M for two independent iterated hash functions with n-bit outputs that are built using Merkle-Damgard construction. In 2004 Joux showed an internal state does not offer better collision and preimage resistance compared to a single strong function. On other hand, problem devising second attacks faster than $$2^n$$2n against this has remained open since 2005 when Kelsey Schneier function optimal long messages. In paper, we develop new algorithms cryptanalysis combiners use them devise first attack on combiner. The finds preimages messages longer $$2^{2n/7}$$22n/7 complexity $$2^{3n/4}$$23n/4. This shows is as ideal function. Our methods also applicable well-studied combiners, $$2^{2n/3}$$22n/3 XOR \oplus functions. improves upon by Leurent Wang presented at Eurocrypt 2015 whose $$2^{5n/6}$$25n/6 but unlike our HAIFA functions. Our exploit properties random mappings generated fixing message block input compression $$H_1$$H1 $$H_2$$H2. Such have been widely used in cryptanalysis, ways combiners.

参考文章(35)
Antoine Joux, Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions Advances in Cryptology – CRYPTO 2004. pp. 306- 316 ,(2004) , 10.1007/978-3-540-28628-8_19
Eli Biham, Orr Dunkelman, A Framework for Iterative Hash Functions — HAIFA ? IACR Cryptology ePrint Archive. ,vol. 2007, pp. 278- ,(2007)
Itai Dinur, Gaëtan Leurent, Improved Generic Attacks Against Hash-Based MACs and HAIFA Algorithmica. ,vol. 79, pp. 1161- 1195 ,(2017) , 10.1007/S00453-016-0236-6
Thomas Peyrin, Lei Wang, Generic Universal Forgery Attack on Iterative Hash-Based MACs theory and application of cryptographic techniques. pp. 147- 164 ,(2014) , 10.1007/978-3-642-55220-5_9
Jian Guo, Thomas Peyrin, Yu Sasaki, Lei Wang, Updates on Generic Attacks against HMAC and NMAC Advances in Cryptology – CRYPTO 2014. pp. 131- 148 ,(2014) , 10.1007/978-3-662-44371-2_8
Gaëtan Leurent, Thomas Peyrin, Lei Wang, New Generic Attacks against Hash-Based MACs international conference on the theory and application of cryptology and information security. pp. 1- 20 ,(2013) , 10.1007/978-3-642-42045-0_1
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer, New Second-Preimage Attacks on Hash Functions Journal of Cryptology. ,vol. 29, pp. 657- 696 ,(2016) , 10.1007/S00145-015-9206-4
Léo Perrin, Dmitry Khovratovich, Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 Fast Software Encryption. pp. 82- 103 ,(2015) , 10.1007/978-3-662-46706-0_5
Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sebastien Zimmer, Second Preimage Attacks on Dithered Hash Functions Advances in Cryptology – EUROCRYPT 2008. ,vol. 4965, pp. 270- 288 ,(2008) , 10.1007/978-3-540-78967-3_16