首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Limited-Birthday Distinguishers for Hash Functions Collisions beyond the Birthday Bound Can Be Meaningful
【24h】

Limited-Birthday Distinguishers for Hash Functions Collisions beyond the Birthday Bound Can Be Meaningful

机译:哈希职能的有限生日区别师超越生日界的碰撞可能有意义

获取原文

摘要

In this article, we investigate the use of limited-birthday distinguishers to the context of hash functions. We first provide a proper understanding of the limited-birthday problem and demonstrate its soundness by using a new security notion Differential Target Collision Resistance (dTCR) that is related to the classical Target Collision Resistance (TCR) notion. We then solve an open problem and close the existing security gap by proving that the best known generic attack proposed at FSE 2010 for the limited-birthday problem is indeed the best possible method. Moreover, we show that almost all known collision attacks are in fact more than just a collision finding algorithm, since the difference mask for the message input is usually fixed. A direct and surprising corollary is that these collision attacks are interesting for cryptanalysis even when their complexity goes beyond the 2~(n/2) birthday bound and up to the 2~n preimage bound, and can be used to derive distinguishers using the limited-birthday problem. Interestingly, cryptanalysts can now search for collision attacks beyond the 2~(n/2) birthday bound. Finally, we describe a generic algorithm that turns a semi-free-start collision attack on a compression function (even if its complexity is beyond the birthday bound) into a distinguisher on the whole hash function when its internal state is not too wide. To the best of our knowledge, this is the first result that exploits classical semi-free-start collisions on the compression function to exhibit a weakness on the whole hash function. As an application of our findings, we provide distinguishers on reduced or full version of several hash functions, such as RIPEMD-128, SHA-256, Whirlpool, etc.
机译:在本文中,我们调查了利用有限生日区别的人们对哈希职能的背景。我们首先提供了对有限生日问题的正确理解,并通过使用与经典目标碰撞电阻(TCR)概念相关的新的安全概念差分目标碰撞电阻(DTCR)来展示其声音。然后,我们通过证明FSE 2010为有限生日问题的最佳已知的通用攻击来解决现有的安全差距,确实是最好的方法。此外,我们表明几乎所有已知的碰撞攻击实际上都不只是碰撞发现算法,因为消息输入的差异掩模通常是固定的。直接和令人惊讶的推论是,即使它们的复杂性超越2〜(n / 2)生日绑定和达到2〜n个预测绑定,这些碰撞攻击也很有意思,即使它们的复杂性超出了2〜n个绑定绑定,并且可用于使用有限的区分区分 - 生日问题。有趣的是,Cryptanalysts现在可以搜索超出2〜(n / 2)生日绑定的碰撞攻击。最后,我们描述了一种通用算法,该算法在压缩函数(即使它的复杂性超出了整个哈希函数的区分机时,也可以在压缩函数上变成半自动碰撞攻击,当其内部状态不是太宽时,即使它超过生日界限)。据我们所知,这是第一个在压缩功能上利用经典的半自动碰撞,以表现在整个哈希函数上的弱点。作为我们的调查结果的应用,我们提供了几个哈希函数的减少或完整版的区别,如Ripemd-128,Sha-256,惠而浦等。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号