Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock

被引:2
|
作者
Chen, Shiwei [1 ,2 ]
Jin, Chenhui [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450002, Henan, Peoples R China
[2] Sci & Technol Informat Assurance Lab, Beijing 100072, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Hashing modes; preimage attack; LBlock; initial structure; splice-and-cut technique; partial matching; FEISTEL; MD5;
D O I
10.1109/ACCESS.2018.2864663
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present preimage attacks on several hashing modes instantiating reduced-round LBlock. It is observed that the omission of the network twist in the last round and the diffusion of the permutation in round function are the key points for our successful attack. First, to guarantee the validity of our attack, we prove one proposition on the round function. Then, utilizing the property of LBlock and several meet-in-the-middle techniques, we present a preimage attack on Davies-Meyer hashing mode instantiating 13-round LBlock, of which the time complexity is about O(2(55)(.4)) 13-round compression function computations, less than the ideal complexity O(2(64)) and the memory complexity is about 2(12) 32-bit memory. Furthermore, we extend our results to the Matyas-Meyer-Oseas mode and MP mode with some changes. Finally, we convert the preimage attack into preimage attack or second preimage attack on the corresponding hash functions with Merkle-Damgard structure.
引用
收藏
页码:44659 / 44665
页数:7
相关论文
共 50 条
  • [41] Quantum rebound attacks on reduced-round ARIA-based hash functions
    Baek, Seungjun
    Kim, Jongsung
    ETRI JOURNAL, 2023, 45 (03) : 365 - 378
  • [42] Related-Key Attacks on Reduced-Round Hierocrypt-L1
    Taga, Bungo
    Moriai, Shiho
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 126 - 137
  • [43] Improved key-recovery attacks on reduced-round WEM-8
    Jun Liu
    Dachao Wang
    Yupu Hu
    Jie Chen
    Baocang Wang
    Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
  • [44] Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128
    Li, Rongjia
    Jin, Chenhui
    COMPUTER JOURNAL, 2018, 61 (08): : 1158 - 1165
  • [45] Improved key-recovery attacks on reduced-round WEM-8
    Liu, Jun
    Wang, Dachao
    Hu, Yupu
    Chen, Jie
    Wang, Baocang
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (10) : 2419 - 2448
  • [46] Improved meet-in-the-middle attacks on reduced-round Joltik-BC
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2021, 15 (03) : 247 - 255
  • [47] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks on Reduced-Round AES
    Ping Wang
    Xiaomei Chen
    Guohao Jiang
    International Journal of Theoretical Physics, 2022, 61
  • [48] Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC
    Shiba, Rentaro
    Sakamoto, Kosei
    Liu, Fukang
    Minematsu, Kazuhiko
    Isobe, Takanori
    IET INFORMATION SECURITY, 2022, 16 (02) : 75 - 85
  • [49] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks on Reduced-Round AES
    Wang, Ping
    Chen, Xiaomei
    Jiang, Guohao
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (01)
  • [50] Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
    Aumasson, Jean-Philippe
    Dinur, Itai
    Meier, Willi
    Shamir, Adi
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 1 - +