首页> 外文OA文献 >New Second Preimage Attacks on Dithered\ud Hash Functions with Low Memory Complexity
【2h】

New Second Preimage Attacks on Dithered\ud Hash Functions with Low Memory Complexity

机译:抖动\ ud的新第二次原像攻击 具有低内存复杂度的哈希函数

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

textabstractDithered hash functions were proposed by Rivest as a method\udto mitigate second preimage attacks on Merkle-Damgard hash functions.\udDespite that, second preimage attacks against dithered hash functions\udwere proposed by Andreeva et al. One issue with these second preimage\udattacks is their huge memory requirement in the precomputation and the\udonline phases. In this paper, we present new second preimage attacks on\udthe dithered Merkle-Damgard construction. These attacks consume significantly\udless memory in the online phase (with a negligible increase in\udthe online time complexity) than previous attacks. For example, in the\udcase of MD5 with the Keranen sequence, we reduce the memory complexity\udfrom about 2^51 blocks to about 2^26.7 blocks (about 545 MB). We also\udpresent an essentially memoryless variant of Andreeva et al. attack. In\udcase of MD5-Keranen or SHA1-Keranen, the offline and online memory\udcomplexity is 2^15.2 message blocks (about 188–235 KB), at the expense\udof increasing the offline time complexity.
机译:Rivest提出了textabstractDithered散列函数作为一种方法\ ud,以减轻对Merkle-Damgard散列函数的第二次镜像攻击。\ ud尽管如此,Andreeva等人提出了针对dithered散列函数的第二次镜像攻击。这些第二个preimage \ udattacks的问题是它们在预计算和\ udonline阶段的巨大内存需求。在本文中,我们提出了对抖动的Merkle-Damgard结构的第二次原像攻击。与以前的攻击相比,这些攻击在联机阶段会消耗大量\无用的内存(联机时间复杂度的增加可以忽略不计)。例如,在具有Keranen序列的MD5情况下,我们将内存复杂度从大约2 ^ 51块降低到大约2 ^ 26.7块(大约545 MB)。我们也给出了Andreeva等人的一个基本上没有记忆的变体。攻击。在MD5-Keranen或SHA1-Keranen的情况下,脱机和联机内存\ udcomplexity为2 ^ 15.2消息块(约188-235 KB),以增加脱机时间复杂度为代价。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号