首页> 外文会议>Australasian Conference on Information Security and Privacy(ACISP 2007); 20070702-04; Townsville(AU) >Second Preimages for Iterated Hash Functions and Their Implications on MACs
【24h】

Second Preimages for Iterated Hash Functions and Their Implications on MACs

机译:哈希函数迭代的第二个原像及其对MAC的影响

获取原文
获取原文并翻译 | 示例

摘要

In this article, we focus on second preimages for iterated hash functions. More precisely, we introduce the notion of a b-block bypass which is closely related to the notion of second preimage but specifies additional properties. We will then give two examples of iterated hash functions to which this notion applies: a double-block length hash function and a single-block length hash function. Furthermore, we look at NMAC and HMAC and show the implications of a b-block bypass regarding forgery attacks. As a result it turns out that the impact of second preimages for NMAC and HMAC heavily depends on how the second preimages are constructed.
机译:在本文中,我们重点介绍用于迭代哈希函数的第二个原像。更准确地说,我们介绍了b块旁路的概念,它与第二原像的概念密切相关,但指定了其他属性。然后,我们将给出此概念适用的两个迭代哈希函数示例:一个双块长度哈希函数和一个单块长度哈希函数。此外,我们研究了NMAC和HMAC并显示了b块绕过对伪造攻击的影响。结果证明,第二原像对NMAC和HMAC的影响在很大程度上取决于如何构造第二原像。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号