New Second-Preimage Attacks on Hash Functions

作者: Elena Andreeva , Charles Bouillaguet , Orr Dunkelman , Pierre-Alain Fouque , Jonathan Hoch

DOI: 10.1007/S00145-015-9206-4

关键词:

摘要: In this work, we present several new generic second-preimage attacks on hash functions. Our first attack is based the herding and applies to various Merkle---Damgard-based iterative Compared previously known long-message attacks, our offers more flexibility in choosing message at cost of a small computational overhead. More concretely, allows adversary replace only few blocks original target obtain second preimage. As result, applicable constructions believed be immune such attacks. Among others, these include dithered proposal Rivest, Shoup's UOWHF, ROX constructions. addition, also suggest time-memory-data tradeoff variants, allowing for faster online phase, even finding preimages shorter messages. We further extend sequences stronger than ones suggested Rivest's proposal. To end introduce kite generator as tool any dithering sequence over alphabet. Additionally, analyse security basic tree construction. Here propose their variants. Finally, show how both previous can applied efficiently when multiple short messages, rather single long message, are available.

参考文章(57)
Stefan Lucks, Jon Callas, The Skein Hash Function Family ,(2009)
Jean-Jacques Pansiot, Complexité des Facteurs des Mots Infinis Engendrés par Morphimes Itérés international colloquium on automata, languages and programming. pp. 380- 389 ,(1984) , 10.1007/3-540-13345-3_34
Antoine Joux, Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions Advances in Cryptology – CRYPTO 2004. pp. 306- 316 ,(2004) , 10.1007/978-3-540-28628-8_19
Eli Biham, Orr Dunkelman, A Framework for Iterative Hash Functions — HAIFA ? IACR Cryptology ePrint Archive. ,vol. 2007, pp. 278- ,(2007)
Elena Andreeva, Bart Mennink, Provable Chosen-Target-Forced-Midfix Preimage Resistance Selected Areas in Cryptography. pp. 37- 54 ,(2012) , 10.1007/978-3-642-28496-0_3
Christophe De Cannière, Christian Rechberger, Finding SHA-1 characteristics: general results and applications international conference on the theory and application of cryptology and information security. pp. 1- 20 ,(2006) , 10.1007/11935230_1
Jean-Philippe Aumasson, Willi Meier, Luca Henzen, Raphael C.-W. Phan, SHA-3 proposal BLAKE ,(2009)
Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sebastien Zimmer, Second Preimage Attacks on Dithered Hash Functions Advances in Cryptology – EUROCRYPT 2008. ,vol. 4965, pp. 270- 288 ,(2008) , 10.1007/978-3-540-78967-3_16
Gaëtan Leurent, MD4 is Not One-Way fast software encryption. pp. 412- 428 ,(2008) , 10.1007/978-3-540-71039-4_26