Bit-Free Collision: Application to APOP Attack

被引:0
|
作者
Wang, Lei [1 ]
Sasaki, Yu [1 ]
Sakiyama, Kazuo [1 ]
Ohta, Kazuo [1 ]
机构
[1] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
关键词
hash function; bit-free collision; APOP; MD5; MD4; HASH FUNCTIONS; MD5; SHA-0;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Thus paper proposes a new variant of collisions oil hash functions named bit-free collision, which can be applied to reduce the number of chosen challenges ill password recovery attacks oil hash-based challenge and response protocols, such as APOP (Authentication Post Office Protocol). Ill all previous APOP attacks, the attacker needs to impersonate the server and to send poisoned chosen challenges to the user. Impersonating the Server takes a risk that the user may find out lie is being attacked Hence, it is important for the attacker to reduce the number of impersonation ill order to lower the probability that the attack will be detected. To achieve this, reducing the number of chosen challenges is necessary This paper is the first approach to improve previous APOP attacks based oil this observation to our best knowledge With t-bit-free collisions presented in this paper, the number of chosen challenges to recover each password character Call be reduced by approximately a factor of 2(t). Though our attack utilizing t-bit-free collisions needs higher offline complexity than previous attacks, the offline computation call be finished ill practical time, if the attacker call obtain reasonable computation power Ill this research, we generate I.-bit-free collisions oil MD5 practically As a result, the number of challenges for password recovery attacks oil real APOP is approximately half reduced. Of independent interest, we apply the bit-free-collision attack oil a simpler hash function MD4, and show that 3-bit-free collisions call be generated practically.
引用
收藏
页码:3 / 21
页数:19
相关论文
共 50 条
  • [31] Generative Collision Attack on Deep Image Hashing
    Ying, Luyang
    Xiong, Cheng
    Qin, Chuan
    Luo, Xiangyang
    Qian, Zhenxing
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2748 - 2762
  • [32] Collision attack on reduced-round Camellia
    Wenling Wu
    Dengguo Feng
    Science in China Series F: Information Sciences, 2005, 48 : 78 - 90
  • [33] NEW PSEUDO NEAR COLLISION ATTACK ON TIGER
    Mallik, Dibyendu
    Mukhopadhyay, Debdeep
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 427 - 430
  • [34] Collision attack on reduced-round Camellia
    Wu, WL
    Feng, DG
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (01): : 78 - 90
  • [35] Horizontal collision correlation attack on elliptic curves
    Bauer, Aurelie
    Jaulmes, Eliane
    Prouff, Emmanuel
    Reinhard, Jean-Rene
    Wild, Justine
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (01): : 91 - 119
  • [36] Collision attack on reduced-round Camellia
    WU Wenling & FENG Dengguo State Key Laboratory of Information Security
    Science in China(Series F:Information Sciences), 2005, (01) : 78 - 90
  • [37] Collision Attack on NaSHA-384/512
    Li, Zhimin
    Jiang, Hongan
    Li, Cunhua
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 243 - 246
  • [38] Horizontal Collision Correlation Attack on Elliptic Curves
    Bauer, Aurelie
    Jaulmes, Eliane
    Prouff, Emmanuel
    Wild, Justine
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 553 - 570
  • [39] Improved collision attack on reduced round Camellia
    Guan Jie
    Zhang Zhongya
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 182 - +
  • [40] A new collision attack on MD5
    Wang Yu
    Chen Jianhua
    He Debiao
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 767 - 770