首页> 外文会议>International Conference on Cryptology and Network Security >New Second Preimage Attack Variants against the MD-Structure
【24h】

New Second Preimage Attack Variants against the MD-Structure

机译:新的第二个预测攻击变体对抗MD结构

获取原文

摘要

We consider a situation where the adversary performs a second preimage attack and is able to influence slightly the preconditions under which the iterated hash function is used. In the first variant of the attack, the adversary is able to choose the initial value of the hash function after receiving the original message. In the second variant, the adversary is allowed to determine a prefix of the original message and has to create a second preimage with the same prefix. Both of these attacks use diamond structures and the expected number of compression function calls required to complete each of them successfully is in O({the square root of}n·2~(2n/3)) while on random oracle hash function it is in O(2~n). We also show that it is possible to decrease the before mentioned expected value to O(2 2n-1/3) if the length of the original message is 2~l and l is sufficiently large. Furthermore, we generalize these attacks to work against concatenated hash functions as well.
机译:我们考虑了对手执行第二次预测攻击的情况,并且能够略微影响使用迭代哈希函数的前提条件。在攻击的第一个变体中,对手能够在接收到原始信息后选择散列函数的初始值。在第二变量中,允许对手确定原始消息的前缀,并且必须使用相同的前缀创建第二个预象。这两种攻击都使用菱形结构,并且成功完成每个所需的预期压缩函数呼叫是在O(} n·2〜(2n / 3)的{n·2〜(2n / 3))上,而在随机oracle哈希函数上是在O(2〜n)。我们还表明,如果原始信息的长度为2〜L,L足够大,则可以将预期值减少到O(2 2N-1/3)。此外,我们也概括了这些攻击,以防止连接哈希函数。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号