首页> 外文会议>Information security and cryptology - ICISC 2010 >Preimage Attacks against PKC98-Hash and HAS-V
【24h】

Preimage Attacks against PKC98-Hash and HAS-V

机译:针对PKC98-Hash和HAS-V的原像攻击

获取原文
获取原文并翻译 | 示例

摘要

We propose preimage attacks against PKC98-Hash and HAS-V. PKC98-Hash is a 160-bit hash function proposed at PKC 1998, and HAS-V, a hash function proposed at SAC 2000, can produce hash values of 128 + 32fc (k = 0,1,..., 6) bits. These hash functions adopt the Merkle-Damgard and Davies-Meyer constructions. One unique characteristic of these hash functions is that their step functions are not injec-tive with a fixed message. We utilize this property to mount preimage attacks against these hash functions. Note that these attacks can work for an arbitrary number of steps. The best proposed attacks generate preimages of PKC98-Hash and HAS-V-320 in 296 and 2256 compression function computations with negligible memory, respectively. This is the first preimage attack against the full PKC98-Hash function.
机译:我们提出针对PKC98-Hash和HAS-V的原像攻击。 PKC98-Hash是PKC 1998提出的160位哈希函数,而HAS-V是SAC 2000提出的哈希函数,可以产生128 + 32fc(k = 0,1,...,6)位的哈希值。这些哈希函数采用Merkle-Damgard和Davies-Meyer构造。这些散列函数的一个独特特征是它们的阶跃函数不影响固定消息。我们利用此属性对这些散列函数发起原像攻击。请注意,这些攻击可以执行任意数量的步骤。提出的最佳攻击方法分别在296和2256个压缩函数计算中以可忽略的内存生成PKC98-Hash和HAS-V-320的原像。这是针对完整PKC98-Hash功能的第一个原像攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号