首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Collision Attacks against the Knudsen-Preneel Compression Functions
【24h】

Collision Attacks against the Knudsen-Preneel Compression Functions

机译:碰撞攻击knudsen-preneel压缩功能

获取原文

摘要

Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear error-correcting code is used to build a wide-pipe compression function from underlying block-ciphers operating in Davies-Meyer mode. Their main design goal was to deliver compression functions with collision resistance up to, and even beyond, the block size of the underlying blockciphers. In this paper, we present new collision-finding attacks against these compression functions using the ideas of an unpublished work of Watanabe and the preimage attack of Ozen, Shrimpton, and Stam (FSE'10). In brief, our best attack has a time complexity strictly smaller than the block-size for all but two of the parameter sets. Consequently, the time complexity lower bound proven by Knudsen and Preneel is incorrect and the compression functions do not achieve the security level they were designed for.
机译:Knudsen和Preneel(AsiaCrypt'96和Crypto'97)介绍了一个散列函数设计,其中线性纠错码用于构建来自在Davies-Meyer模式下运行的底层块密码的宽管压缩功能。它们的主要设计目标是提供抗冲抵抗的压缩功能,甚至超过底层块块的块大小。在本文中,我们使用Watanabe未发表的工作的想法和Ozen,Shrimpton和STAM(FSE10)的思想来提出新的碰撞发现攻击这些压缩功能。简而言之,我们的最佳攻击具有时间复杂性严格小于所有除两个参数集的块大小。因此,Chaudsen和Preneel的时间复杂性降低的时间不正确,压缩功能不会达到它们所设计的安全级别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号