Bit-Free Collision: Application to APOP Attack

被引:0
|
作者
Wang, Lei [1 ]
Sasaki, Yu [1 ]
Sakiyama, Kazuo [1 ]
Ohta, Kazuo [1 ]
机构
[1] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
关键词
hash function; bit-free collision; APOP; MD5; MD4; HASH FUNCTIONS; MD5; SHA-0;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Thus paper proposes a new variant of collisions oil hash functions named bit-free collision, which can be applied to reduce the number of chosen challenges ill password recovery attacks oil hash-based challenge and response protocols, such as APOP (Authentication Post Office Protocol). Ill all previous APOP attacks, the attacker needs to impersonate the server and to send poisoned chosen challenges to the user. Impersonating the Server takes a risk that the user may find out lie is being attacked Hence, it is important for the attacker to reduce the number of impersonation ill order to lower the probability that the attack will be detected. To achieve this, reducing the number of chosen challenges is necessary This paper is the first approach to improve previous APOP attacks based oil this observation to our best knowledge With t-bit-free collisions presented in this paper, the number of chosen challenges to recover each password character Call be reduced by approximately a factor of 2(t). Though our attack utilizing t-bit-free collisions needs higher offline complexity than previous attacks, the offline computation call be finished ill practical time, if the attacker call obtain reasonable computation power Ill this research, we generate I.-bit-free collisions oil MD5 practically As a result, the number of challenges for password recovery attacks oil real APOP is approximately half reduced. Of independent interest, we apply the bit-free-collision attack oil a simpler hash function MD4, and show that 3-bit-free collisions call be generated practically.
引用
收藏
页码:3 / 21
页数:19
相关论文
共 50 条
  • [21] Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification
    Yajima, Jun
    Shimoyama, Takeshi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 267 - 284
  • [22] Instruction-Fetching Attack and Practice in Collision Fault Attack on AES
    Jiang, Huilong
    Zhu, Xiang
    Han, Jianwei
    SYMMETRY-BASEL, 2022, 14 (10):
  • [23] Collision-Free Transmissions in an IoT Monitoring Application Based on LoRaWAN
    Haiahem, Rahim
    Minet, Pascale
    Boumerdassi, Selma
    Saidane, Leila Azouz
    SENSORS, 2020, 20 (14) : 1 - 33
  • [24] APPLICATION OF MICROWAVE DIAGNOSTICS TO A COLLISION-FREE SHOCK WAVE EXPERIMENT
    HARTWIG, H
    HINTZ, E
    PLASMA PHYSICS, 1968, 10 (04): : 453 - &
  • [25] Collision resistance of double-block-length hash function against free-start attack
    Hirose, Shoichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 74 - 82
  • [26] Mitigating Use-After-Free Attack with Application Program Loader
    Saito, Takamichi
    Sugawara, Ryota
    Yokoyama, Masateru
    Kondo, Shuta
    Miyazaki, Hiroyuki
    Bing, Wang
    Watanabe, Ryohei
    2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2017, : 919 - 924
  • [27] Bit-Pattern Based Integral Attack
    Z'aba, Muhammad Reza
    Raddum, Havard
    Henricksen, Matt
    Dawson, Ed
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 363 - +
  • [28] Bit-Flip Attack: Crushing Neural Network with Progressive Bit Search
    Rakin, Adnan Siraj
    He, Zhezhi
    Fan, Deliang
    2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019), 2019, : 1211 - 1220
  • [29] Message freedom in MD4 and MD5 collisions: Application to APOP
    Leurent, Gaetan
    FAST SOFTWARE ENCRYPTION, 2007, 4593 : 309 - 328
  • [30] Collision attack on XTR and a countermeasure with a fixed pattern
    Han, DG
    Takagi, T
    Kim, TH
    Kim, HW
    Chung, KI
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 864 - 873