Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock

被引:2
|
作者
Chen, Shiwei [1 ,2 ]
Jin, Chenhui [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450002, Henan, Peoples R China
[2] Sci & Technol Informat Assurance Lab, Beijing 100072, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Hashing modes; preimage attack; LBlock; initial structure; splice-and-cut technique; partial matching; FEISTEL; MD5;
D O I
10.1109/ACCESS.2018.2864663
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present preimage attacks on several hashing modes instantiating reduced-round LBlock. It is observed that the omission of the network twist in the last round and the diffusion of the permutation in round function are the key points for our successful attack. First, to guarantee the validity of our attack, we prove one proposition on the round function. Then, utilizing the property of LBlock and several meet-in-the-middle techniques, we present a preimage attack on Davies-Meyer hashing mode instantiating 13-round LBlock, of which the time complexity is about O(2(55)(.4)) 13-round compression function computations, less than the ideal complexity O(2(64)) and the memory complexity is about 2(12) 32-bit memory. Furthermore, we extend our results to the Matyas-Meyer-Oseas mode and MP mode with some changes. Finally, we convert the preimage attack into preimage attack or second preimage attack on the corresponding hash functions with Merkle-Damgard structure.
引用
收藏
页码:44659 / 44665
页数:7
相关论文
共 50 条
  • [31] Differential-Aided Preimage Attacks On Round-Reduced Keccak
    Wei, Congming
    Dong, Xiaoyang
    Meier, Willi
    Qin, Lingyue
    Fu, Ximing
    COMPUTER JOURNAL, 2023, 66 (12): : 3069 - 3091
  • [32] Analysis of Two Attacks on Reduced-Round Versions of the SMS4
    Toz, Deniz
    Dunkelman, Orr
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2008, 5308 : 141 - +
  • [33] Higher Order Differential Attacks on Reduced-Round MISTY1
    Tsunoo, Yukiyasu
    Saito, Teruo
    Shigeri, Maki
    Kawabata, Takeshi
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 415 - +
  • [34] Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V
    Hoki, Jin
    Isobe, Takanori
    Ito, Ryoma
    Liu, Fukang
    Sakamoto, Kosei
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 171 - 190
  • [35] Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
    Abdelkhalek, Ahmed
    AlTawy, Riham
    Tolba, Mohamed
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 187 - 203
  • [36] Improved key recovery attacks on reduced-round Salsa20
    Dey, Sabyasachi
    Leander, Gregor
    Sharma, Nitin Kumar
    DESIGNS CODES AND CRYPTOGRAPHY, 2025, 93 (01) : 243 - 262
  • [37] Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grostl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions
    Ma, Bingke
    Li, Bao
    Hao, Ronglin
    Li, Xiaoqian
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 79 - 96
  • [38] Improved preimage attacks on hash modes of 8-round AES-256
    Hong, Deukjo
    Kim, Dong-Chan
    Kwon, Daesung
    Kim, Jongsung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) : 14525 - 14539
  • [39] Improved preimage attacks on hash modes of 8-round AES-256
    Deukjo Hong
    Dong-Chan Kim
    Daesung Kwon
    Jongsung Kim
    Multimedia Tools and Applications, 2016, 75 : 14525 - 14539
  • [40] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128
    Liu, Ya
    Yang, Anren
    Dai, Bo
    Li, Wei
    Liu, Zhiqiang
    Gu, Dawu
    Zeng, Zhiqiang
    COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258