On The Collision And Preimage Resistance Of Certain Two-Call Hash Functions

Lecture Notes in Computer Science(2010)

引用 0|浏览52
暂无评分
摘要
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound.We also present undesirable properties of some of Stam's compression functions proposed at CRYPTO '08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2(n/3). We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2(n/2). The complexity of our preimage attack on this hash function is about 2(n). Finally, we present a collision attack on a variant of the proposed in + s-bit to s-bit scheme, truncated to s - 1 bits, with a complexity of 0(1). However, none of our results compromise Stam's security claims.
更多
查看译文
关键词
cryptographic hash functions,information-theoretic security,permutation-based hash functions
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要