Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damgaard - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2009

Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damgaard

Résumé

In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgaard̊ construction. We extend the herding attack to concatenated hashes, and to certain hash functions that process each message block several times. Using this technique, we show a second preimage attack on the folklore “hash-twice” construction which process two concatenated copies of the message. We follow with showing how to apply the herding attack to tree hashes. Finally, we present a new type of attack — the trojan message attack, which allows for producing second preimages of unknown messages (from a small known space) when they are appended with a fixed suffix.
Fichier principal
Vignette du fichier
SAC2009.pdf (248.64 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

inria-00417798 , version 1 (17-09-2009)

Identifiants

  • HAL Id : inria-00417798 , version 1

Citer

Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, John Kelsey. Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damgaard. SAC, Aug 2009, Calgary, Canada. 22p. ⟨inria-00417798⟩
94 Consultations
114 Téléchargements

Partager

Gmail Facebook X LinkedIn More