The Collision Security of MDC-4

作者: Ewan Fleischmann , Christian Forler , Stefan Lucks

DOI: 10.1007/978-3-642-31410-0_16

关键词:

摘要: There are four somewhat classical double length block cipher based compression functions known: MDC-2, MDC-4, Abreast-DM, and Tandem-DM. They all have been developed over 20 years ago. In recent years, cryptographic research has put a focus on hashing found collision security results for three of them (MDC-2, Tandem-DM). this paper, we add which is part the IBM CLiC module, to that list by showing --- 'instantiated' using an ideal with 128 bit key/plaintext/ciphertext size no adversary asking less than 274.76 queries can find probability greater 1/2. This first result hash function MDC-4. The MDC-4 created interconnecting two MDC-2 but only one message instead two. The developers aim was offer higher margin, when compared still being fast enough practical purposes. The proof Steinberger (EUROCRYPT 2007) cannot be directly applied due structural differences. Although sharing many commonalities, our much shorter claim presentation also easier grasp.

参考文章(28)
Stefan Lucks, Jon Callas, The Skein Hash Function Family ,(2009)
John P. Steinberger, The Collision Intractability of MDC-2 in the Ideal-Cipher Model international cryptology conference. pp. 34- 51 ,(2007) , 10.1007/978-3-540-72540-4_3
Shimon Even, Yishay Mansour, A Construction of a Cioher From a Single Pseudorandom Permutation international cryptology conference. pp. 210- 224 ,(1991) , 10.1007/3-540-57332-1_17
Ewan Fleischmann, Michael Gorski, Stefan Lucks, Security of Cyclic Double Block Length Hash Functions Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding. pp. 153- 175 ,(2009) , 10.1007/978-3-642-10868-6_10
Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks, Collision resistant double-length hashing provable security. pp. 102- 118 ,(2010) , 10.1007/978-3-642-16280-0_7
Jooyoung Lee, Martijn Stam, John Steinberger, The collision security of tandem-DM in the ideal cipher model international cryptology conference. ,vol. 2010, pp. 561- 577 ,(2011) , 10.1007/978-3-642-22792-9_32
Jooyoung Lee, Martijn Stam, MJH: a faster alternative to MDC-2 the cryptographers track at the rsa conference. pp. 213- 236 ,(2011) , 10.1007/978-3-642-19074-2_15
Ivan Bjerre Damgård, A design principle for hash functions international cryptology conference. pp. 416- 427 ,(1989) , 10.1007/0-387-34805-0_39
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu, Cryptanalysis of the hash functions MD4 and RIPEMD theory and application of cryptographic techniques. pp. 1- 18 ,(2005) , 10.1007/11426639_1
Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen, Cryptanalysis of MDC-2 international cryptology conference. pp. 106- 120 ,(2009) , 10.1007/978-3-642-01001-9_6