Bit-Free Collision: Application to APOP Attack

被引:0
|
作者
Wang, Lei [1 ]
Sasaki, Yu [1 ]
Sakiyama, Kazuo [1 ]
Ohta, Kazuo [1 ]
机构
[1] Univ Electrocommun, Chofu, Tokyo 1828585, Japan
关键词
hash function; bit-free collision; APOP; MD5; MD4; HASH FUNCTIONS; MD5; SHA-0;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Thus paper proposes a new variant of collisions oil hash functions named bit-free collision, which can be applied to reduce the number of chosen challenges ill password recovery attacks oil hash-based challenge and response protocols, such as APOP (Authentication Post Office Protocol). Ill all previous APOP attacks, the attacker needs to impersonate the server and to send poisoned chosen challenges to the user. Impersonating the Server takes a risk that the user may find out lie is being attacked Hence, it is important for the attacker to reduce the number of impersonation ill order to lower the probability that the attack will be detected. To achieve this, reducing the number of chosen challenges is necessary This paper is the first approach to improve previous APOP attacks based oil this observation to our best knowledge With t-bit-free collisions presented in this paper, the number of chosen challenges to recover each password character Call be reduced by approximately a factor of 2(t). Though our attack utilizing t-bit-free collisions needs higher offline complexity than previous attacks, the offline computation call be finished ill practical time, if the attacker call obtain reasonable computation power Ill this research, we generate I.-bit-free collisions oil MD5 practically As a result, the number of challenges for password recovery attacks oil real APOP is approximately half reduced. Of independent interest, we apply the bit-free-collision attack oil a simpler hash function MD4, and show that 3-bit-free collisions call be generated practically.
引用
收藏
页码:3 / 21
页数:19
相关论文
共 50 条
  • [42] Collision-Free Trajectory Planning for Multi-UAV Coordinated Ground Attack Mission under Uncertainties
    Tang, Jiayu
    Li, Xiangmin
    Dai, Jinjin
    Bo, Ning
    2019 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2019), VOL 1, 2019, : 89 - 92
  • [43] A novel application of breadth first algorithm for achieving collision free memory mapping
    Rehman, Saeed Ur
    Awan, Saeed Ehsan
    Mumtaz, Fazel Rehman
    Raja, Muhammad Asif Zahoor
    PLOS ONE, 2019, 14 (08):
  • [44] ATTACK ON FREE TIME
    SCHNEIDRZIK, WEJ
    MUNCHENER MEDIZINISCHE WOCHENSCHRIFT, 1979, 121 (24): : 801 - 801
  • [45] Modeling bit flipping decoding based on nonorthogonal check sums with application to iterative decoding attack of McEliece cryptosystem
    Fossorier, Marc P. C.
    Kobara, Kazukuni
    Imai, Hideki
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (01) : 402 - 411
  • [46] ProFlip: Targeted Trojan Attack with Progressive Bit Flips
    Chen, Huili
    Fu, Cheng
    Zhao, Jishen
    Koushanfar, Farinaz
    2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 7698 - 7707
  • [47] Bit-pattern Based Integral Attack on ICEBERG
    Wei, Yuechuan
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 370 - 373
  • [48] A collision-attack on AES - Combining side channel- and differential-attack
    Schramm, K
    Leander, G
    Felke, P
    Paar, C
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 163 - 175
  • [49] An improved collision attack on MD5 algorithm
    Chen, Shiwei
    Jin, Chenhui
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 343 - 357
  • [50] Efficient Collision Attack Frameworks for RIPEMD-160
    Liu, Fukang
    Dobraunig, Christoph
    Mendel, Florian
    Isobe, Takanori
    Wang, Gaoli
    Cao, Zhenfu
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 117 - 149