Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock

被引:2
|
作者
Chen, Shiwei [1 ,2 ]
Jin, Chenhui [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450002, Henan, Peoples R China
[2] Sci & Technol Informat Assurance Lab, Beijing 100072, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Hashing modes; preimage attack; LBlock; initial structure; splice-and-cut technique; partial matching; FEISTEL; MD5;
D O I
10.1109/ACCESS.2018.2864663
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present preimage attacks on several hashing modes instantiating reduced-round LBlock. It is observed that the omission of the network twist in the last round and the diffusion of the permutation in round function are the key points for our successful attack. First, to guarantee the validity of our attack, we prove one proposition on the round function. Then, utilizing the property of LBlock and several meet-in-the-middle techniques, we present a preimage attack on Davies-Meyer hashing mode instantiating 13-round LBlock, of which the time complexity is about O(2(55)(.4)) 13-round compression function computations, less than the ideal complexity O(2(64)) and the memory complexity is about 2(12) 32-bit memory. Furthermore, we extend our results to the Matyas-Meyer-Oseas mode and MP mode with some changes. Finally, we convert the preimage attack into preimage attack or second preimage attack on the corresponding hash functions with Merkle-Damgard structure.
引用
收藏
页码:44659 / 44665
页数:7
相关论文
共 50 条
  • [1] Preimage Attacks on Reduced-Round Stribog
    AlTawy, Riham
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 109 - 125
  • [2] Related-Key Differential Attacks on Reduced-Round LBlock
    Weng, Tianling
    Cui, Tingting
    Yang, Ting
    Guo, Yinghua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [3] Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent
    Hong, Deukjo
    Koo, Bonwook
    Kim, Dong-Chan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 372 - 380
  • [4] Preimage attacks on reduced-round <sc>Ascon-Xof</sc>
    Baek, Seungjun
    Kim, Giyoon
    Kim, Jongsung
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (08) : 2197 - 2217
  • [5] Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems
    Pei, Junling
    Chen, Lusheng
    IET INFORMATION SECURITY, 2023, 17 (03) : 394 - 406
  • [6] Zero-correlation linear cryptanalysis of reduced-round LBlock
    Soleimany, Hadi
    Nyberg, Kaisa
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (02) : 683 - 698
  • [7] Zero-correlation linear cryptanalysis of reduced-round LBlock
    Hadi Soleimany
    Kaisa Nyberg
    Designs, Codes and Cryptography, 2014, 73 : 683 - 698
  • [8] Impossible Differential Cryptanalysis of Reduced-Round LBlock-s
    Jia P.
    Xu H.
    Lai X.-J.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 966 - 973
  • [9] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Wen, Long
    Wang, Mei-Qin
    Zhao, Jing-Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (01) : 165 - 176
  • [10] Related-Key Impossible Diferential Attack on Reduced-Round LBlock
    温隆
    王美琴
    赵静远
    JournalofComputerScience&Technology, 2014, 29 (01) : 165 - 176