首页> 外文会议>International Workshop on Security >Bit-Free Collision: Application to APOP Attack
【24h】

Bit-Free Collision: Application to APOP Attack

机译:无提碰撞:Appop攻击

获取原文

摘要

This paper proposes a new variant of collisions on hash functions named bit-free collision, which can be applied to reduce the number of chosen challenges in password recovery attacks on hash-based challenge and response protocols, such as APOP (Authentication Post Office Protocol). In all previous APOP attacks, the attacker needs to impersonate the server and to send poisoned chosen challenges to the user. Impersonating the server takes a risk that the user may find out he is being attacked. Hence, it is important for the attacker to reduce the number of impersonation in order to lower the probability that the attack will be detected. To achieve this, reducing the number of chosen challenges is necessary. This paper is the first approach to improve previous APOP attacks based on this observation to our best knowledge. With t-bit-free collisions presented in this paper, the number of chosen challenges to recover each password character can be reduced by approximately a factor of 2~t. Though our attack utilizing t-bit-free collisions needs higher offline complexity than previous attacks, the offline computation can be finished in practical time if the attacker can obtain reasonable computation power. In this research, we generate 1-bit-free collisions on MD5 practically. As a result, the number of challenges for password recovery attacks on real APOP is approximately half reduced. Of independent interest, we apply the bit-free-collision attack on a simpler hash function MD4, and show that 3-bit-free collisions can be generated practically.
机译:本文提出了一个名为“无提位冲突的散列函数的新变种,这可以应用于减少密码恢复攻击中所选挑战数量的基于哈希的挑战和响应协议(例如APOP)(身份验证邮局协议) 。在所有以前的APOP攻击中,攻击者需要模拟服务器并向用户发送中毒所选择的挑战。冒充服务器冒险用户可能会发现他正在受到攻击的风险。因此,攻击者很重要,以减少模拟的数量,以降低攻击将被检测到的概率。为实现这一点,需要减少所选挑战的数量。本文是基于对我们最佳知识的观察来改善以前的APOP攻击的第一种方法。本文提出了无足机碰撞,可以减少恢复每个密码字符的所选挑战的数量大约是2〜t。虽然我们利用T型碰撞的攻击需要比以前的攻击更高的离线复杂性,但如果攻击者可以获得合理的计算能力,则可以在实际时间完成离线计算。在这项研究中,我们实际上在MD5上产生了1位无所机的冲突。因此,真实APOP对密码恢复攻击的挑战次数大约减少了一半。独立兴趣,我们在更简单的哈希函数MD4上应用比特碰撞攻击,并显示实际上可以生成3位碰撞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号