...
【24h】

On hash functions using checksums

机译:关于使用校验和的哈希函数

获取原文
获取原文并翻译 | 示例

摘要

We analyse the security of iterated hash functionsthat compute an input dependent checksum which is pro-cessed as part of the hash computation. We show that a largeclass of such schemes, including those using non-linear oreven one-way checksum functions, is not secure against thesecond preimage attack of Kelsey and Schneier, the herdingattack of Kelsey and Kohno and the multicollision attack ofJoux. Our attacks also apply to a large class of cascaded hashfunctions. Our second preimage attacks on the cascaded hashfunctions improve the results of Joux presented at Crypto'04.We also apply our attacks to the MD2 and GOST hash func-tions. Our second preimage attacks on the MD2 and GOSThash functions improve the previous best known short-cutsecond preimage attacks on these hash functions by factors ofat least 226 and 254, respectively. Our herding and multicolli-sion attacks on the hash functions based on generic checksumfunctions (e.g., one-way) are a special case of the attacks onthe cascaded iterated hash functions previously analysed byDunkelman and Preneel and are not better than their attacks.On hash functions with easily invertible checksums, our mul-ticollision and herding attacks (if the hash value is short as in MD2) are more efficient than those of Dunkelman andPreneel.
机译:我们分析了迭代哈希函数的安全性,这些哈希函数计算与输入有关的校验和,该校验和是哈希计算的一部分。我们证明,这类方案中的一大类,包括那些使用非线性oreven单向校验和函数的方案,对于Kelsey和Schneier的第二次原像攻击,Kelsey和Kohno的人为攻击以及Joux的多冲突攻击是不安全的。我们的攻击还适用于大量的级联哈希函数。我们对级联哈希函数的第二次原像攻击改善了在Crypto'04上发表的Joux的结果。我们还将攻击应用于MD2和GOST哈希函数。我们对MD2和GOSThash函数的第二次预映像攻击分别以至少226和254的系数改进了对这些哈希函数的先前最著名的捷径第二次预映像攻击。我们基于通用校验和函数(例如单向)对哈希函数的成群攻击和多冲突攻击是对Dunkelman和Preneel先前分析的级联迭代哈希函数的攻击的特例,并不比它们的攻击更好。借助容易求逆的校验和,我们的多重发酵和成群攻击(如果哈希值像MD2中那样短)比Dunkelman和Preneel的效率更高。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号