Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damgaard

Abstract : In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgaard̊ construction. We extend the herding attack to concatenated hashes, and to certain hash functions that process each message block several times. Using this technique, we show a second preimage attack on the folklore “hash-twice” construction which process two concatenated copies of the message. We follow with showing how to apply the herding attack to tree hashes. Finally, we present a new type of attack — the trojan message attack, which allows for producing second preimages of unknown messages (from a small known space) when they are appended with a fixed suffix.
Type de document :
Communication dans un congrès
Springer. SAC, Aug 2009, Calgary, Canada. 22p., 2009
Liste complète des métadonnées

Littérature citée [18 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/inria-00417798
Contributeur : Charles Bouillaguet <>
Soumis le : jeudi 17 septembre 2009 - 00:41:04
Dernière modification le : mardi 24 avril 2018 - 17:20:10
Document(s) archivé(s) le : mardi 16 octobre 2012 - 11:01:05

Fichier

SAC2009.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

  • HAL Id : inria-00417798, version 1

Collections

PSL

Citation

Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, John Kelsey. Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damgaard. Springer. SAC, Aug 2009, Calgary, Canada. 22p., 2009. 〈inria-00417798〉

Partager

Métriques

Consultations de la notice

100

Téléchargements de fichiers

86