A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS

Shiwei Chen, Chenhui Jin

2009

Abstract

Using one kind of multicollsions of the Merkle-Damgard(MD) construction for hash functions proposed by Kelsey and Schneier, this paper presents a second preimage attack on MDP construction which is a simple variant ofMD scheme with a permutation for hash functions. Then we prove that the computational complexity of our second preimage attack is k ×2n/2+1 +2n−k less than 2n where n is the size of the hash value and 2k +k+1 is the length of the target message.

References

  1. Xiaoyun W. and Hongbo Y. (2005), How to break MD5 and other hash functions. In Eurocrypt 2005, LNCS 3494, pp. 474-490. Berlin: Springer-Verlag, 2005.
  2. Kelsey J.and Schneier B.(2005), Second preimages on n-bit hash functions for much less than 2n word. In Eurocrypt 2005, LNCS 3494, pp. 19-35. Berlin: SpringerVerlag, 2005.
  3. Kelsey J. and Kohno T.(2006), Herding hash functions and the Nostradamus attack. In Eurocrypt 2006, LNCS 4004, pp. 183-200. Berlin: Springer-Verlag, 2006.
  4. Gauravaram P. and Kelsey J.(2007), Cryptanalysis of a Class of Cryptographic Hash Functions. In CT-RSA 2008, http://eprint.iacr.org/2007/277.
  5. Coron J.S., Dodis Y., Malinaud C. and Puniya P.(2005), Merkle-Damgard Revisited: How to Construct a Hash Function. InCRYPTO 2005. LNCS 3621, pp. 430-448. Berlin: Springer-Verlag, 2005.
  6. Bellare M. and Ristenpart T.(2006), Multi-PropertyPreserving Hash Domain Extension and the EMD Transform. In ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Berlin: Springer-Verlag, 2006.
  7. Hirose S., Park J.H. and Yun A.(2007), A Simple Variant of the Merkle-Damgard Scheme with a Permutation. In ASIACRYPT 2007. LNCS, vol. 4833, pp. 113-129. Berlin: Springer-Verlag, 2007.
  8. Joux A.(2004), Multicollisions in Iterated Hash Functions. In CRYPTO 2004, LNCS 3152, pp. 306-316. Berlin: Springer-Verlag, 2004.
Download


Paper Citation


in Harvard Style

Chen S. and Jin C. (2009). A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 245-248. DOI: 10.5220/0002230202450248


in Bibtex Style

@conference{secrypt09,
author={Shiwei Chen and Chenhui Jin},
title={A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={245-248},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002230202450248},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS
SN - 978-989-674-005-4
AU - Chen S.
AU - Jin C.
PY - 2009
SP - 245
EP - 248
DO - 10.5220/0002230202450248