首页> 外文会议>Advances in information and computer security >Bit-Free Collision: Application to APOP Attack
【24h】

Bit-Free Collision: Application to APOP Attack

机译:无位碰撞:应用于APOP攻击

获取原文
获取原文并翻译 | 示例

摘要

This paper proposes a new variant of collisions on hash functions named bit-free collision, which can be applied to reduce the number of chosen challenges in password recovery attacks on hash-based challenge and response protocols, such as APOP (Authentication Post Office Protocol). In all previous APOP attacks, the attacker needs to impersonate the server and to send poisoned chosen challenges to the user. Impersonating the server takes a risk that the user may find out he is being attacked. Hence, it is important for the attacker to reduce the number of impersonation in order to lower the probability that the attack will be detected. To achieve this, reducing the number of chosen challenges is necessary. This paper is the first approach to improve previous APOP attacks based on this observation to our best knowledge. With t-bit-free collisions presented in this paper, the number of chosen challenges to recover each password character can be reduced by approximately a factor of 2~t. Though our attack utilizing t-bit-free collisions needs higher offline complexity than previous attacks, the offline computation can be finished in practical time if the attacker can obtain reasonable computation power. In this research, we generate 1-bit-free collisions on MD5 practically. As a result, the number of challenges for password recovery attacks on real APOP is approximately half reduced. Of independent interest, we apply the bit-free-collision attack on a simpler hash function MD4, and show that 3-bit-free collisions can be generated practically.
机译:本文提出了一种针对哈希函数的冲突的新变种,称为无位冲突,可用于减少基于哈希的质询和响应协议(例如APOP(身份验证邮局协议))在密码恢复攻击中选择的质询数量。在以前的所有APOP攻击中,攻击者都需要模拟服务器并将有毒的选定挑战发送给用户。冒充服务器冒着使用户可能发现自己受到攻击的风险。因此,对于攻击者而言,减少假冒次数以降低检测到攻击的可能性非常重要。为此,必须减少选择的挑战的数量。本文是根据我们的最新知识改善以前的APOP攻击的第一种方法。利用本文提出的无t位冲突,恢复每个密码字符所选择的挑战数量可以减少大约2t。尽管我们利用无t位冲突的攻击比以前的攻击需要更高的离线复杂度,但是如果攻击者可以获得合理的计算能力,则可以在实际时间内完成离线计算。在这项研究中,我们实际上在MD5上生成了无1位冲突。结果,在实际的APOP上进行密码恢复攻击的挑战数量大约减少了一半。具有独立利益的是,我们将无位冲突攻击应用于更简单的哈希函数MD4,并表明可以实际生成3位无冲突。

著录项

  • 来源
  • 会议地点 Toyama(JP);Toyama(JP)
  • 作者单位

    The University of Electro-Communications,1-5-1 Chofugaoka, Chofu-shi, Tokyo, 182-8585, Japan;

    rnThe University of Electro-Communications,1-5-1 Chofugaoka, Chofu-shi, Tokyo, 182-8585, Japan NTT Information Sharing Platform Laboratories, NTT Corporation;

    rnThe University of Electro-Communications,1-5-1 Chofugaoka, Chofu-shi, Tokyo, 182-8585, Japan;

    rnThe University of Electro-Communications,1-5-1 Chofugaoka, Chofu-shi, Tokyo, 182-8585, Japan;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 计算机设备安全;
  • 关键词

    hash function; bit-free collision; APOP; MD5; MD4;

    机译:哈希函数;无位碰撞; APOP; MD5; MD4;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号