Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock

被引:2
|
作者
Chen, Shiwei [1 ,2 ]
Jin, Chenhui [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450002, Henan, Peoples R China
[2] Sci & Technol Informat Assurance Lab, Beijing 100072, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Hashing modes; preimage attack; LBlock; initial structure; splice-and-cut technique; partial matching; FEISTEL; MD5;
D O I
10.1109/ACCESS.2018.2864663
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present preimage attacks on several hashing modes instantiating reduced-round LBlock. It is observed that the omission of the network twist in the last round and the diffusion of the permutation in round function are the key points for our successful attack. First, to guarantee the validity of our attack, we prove one proposition on the round function. Then, utilizing the property of LBlock and several meet-in-the-middle techniques, we present a preimage attack on Davies-Meyer hashing mode instantiating 13-round LBlock, of which the time complexity is about O(2(55)(.4)) 13-round compression function computations, less than the ideal complexity O(2(64)) and the memory complexity is about 2(12) 32-bit memory. Furthermore, we extend our results to the Matyas-Meyer-Oseas mode and MP mode with some changes. Finally, we convert the preimage attack into preimage attack or second preimage attack on the corresponding hash functions with Merkle-Damgard structure.
引用
收藏
页码:44659 / 44665
页数:7
相关论文
共 50 条
  • [21] Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
    Bao, Zhenzhen
    Ding, Lin
    Guo, Jian
    Wang, Haoyang
    Zhang, Wenying
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 318 - 347
  • [22] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 378 - 396
  • [23] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya LIU
    Liang CHENG
    Zhiqiang LIU
    Wei LI
    Qingju WANG
    Dawu GU
    ScienceChina(InformationSciences), 2018, 61 (03) : 95 - 107
  • [24] Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
    Cui, Tingting
    Grassi, Lorenzo
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 171 - 197
  • [25] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Liu, Ya
    Cheng, Liang
    Liu, Zhiqiang
    Li, Wei
    Wang, Qingju
    Gu, Dawu
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [26] Improved Collision Attacks on the Reduced-Round Grostl Hash Function
    Ideguchi, Kota
    Tischhauser, Elmar
    Preneel, Bart
    INFORMATION SECURITY, 2011, 6531 : 1 - 16
  • [27] Improved meet-in-the-middle attacks on reduced-round DES
    Dunkelman, Orr
    Sekar, Gautharn
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 86 - 100
  • [28] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya Liu
    Liang Cheng
    Zhiqiang Liu
    Wei Li
    Qingju Wang
    Dawu Gu
    Science China Information Sciences, 2018, 61
  • [29] Practical Attacks on Reduced-Round 3D and Saturnin
    Hou, Tao
    Cui, Ting
    Zhang, Jiyan
    COMPUTER JOURNAL, 2023, 66 (02): : 479 - 495
  • [30] Differential and rectangle attacks on reduced-round SHACAL-1
    Lu, Jiqiang
    Kim, Jongsung
    Keller, Nathan
    Dunkelman, Orr
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 17 - +