期刊文献+

对联接杂凑函数的“特洛伊”消息攻击

Trojan message attack on the concatenated hash functions
下载PDF
导出
摘要 "特洛伊"消息攻击是Andreeva等针对MD结构杂凑函数提出的一种攻击方法,首次将其应用于不同于MD结构的一类杂凑函数,即联接杂凑。结合联接杂凑的特点,综合利用Joux的多碰撞和深度为n-l的"钻石树"结构多碰撞,构造出了2n-bit联接杂凑函数的长度为n·2~k块的"特洛伊"消息,并据此首次提出了对其的固定前缀"特洛伊"消息攻击,其存储复杂性为2l+2^(n-l+1)+n·2^(k+1)块消息,时间复杂性为O(n·2^(n+k)+l·2~l)次压缩函数运算,远低于理想的时间复杂性O(n·2^(2n+k)。 The Trojan message attack was proposed by Andreeva, et al. aiming at the hash functions with MD structure. First it was applied on the hash fimction beyond MD structure, that was, concatenated hash. Utilizing the property of the concatenated hash, and combining the Joux's multicollision and the "diamond" structure with the depth of n-l, a Trojan message of the length n. 2k blocks for the 2n-bit concatenated hash was constructed, based on which a chosen-prefix Trojan message attack was first proposed. And the memory complexity of proposed attack is about 21 + 2^n-1+1 + n- 2TM blocks and the time complexity is about O(n. 2^n+1 + l·2^l) computations of the compression function, much less than the ideal value O(n. 2^2b+k)
出处 《通信学报》 EI CSCD 北大核心 2016年第8期46-50,共5页 Journal on Communications
基金 国家自然科学基金资助项目(No.61272041)~~
关键词 杂凑函数 联接杂凑 “特洛伊”消息攻击 多碰撞 复杂性 hash functions, concatenated hash, Trojan message attack, multicollsion, complexity
  • 相关文献

参考文献1

二级参考文献9

  • 1Wang X Y, Feng D G, and Lai X J, et al.. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD[EB/OL]. Cryptology ePrint Archive, Report 2004/199, 2004.
  • 2Wang X Y and Yu H B. How to break MD5 and other hash functions [C]. Eurocrypt' 05, Berlin, 2005, LNCS 3494: 19-35.
  • 3Yu S, Yusuke N, and Jun Y, et al.. How to construct sufficient condition in searching collisions of MD5 [EB/OL]. Cryptology ePrint Archive, Report 2006/074, 2006.
  • 4Xie T, Feng D G, and Liu F B. A new collision differential for MD5 with its full differential path[EB/OL]. Cryptology ePrint Archive, Report 2008/230, 2008.
  • 5Chen S W and Jin C H. An improved collision attack on MD5 algorithm[C]. Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31- September 5, 2007, Lecture Notes in Computer Science, 2007, Vol. 4990: 343-357.
  • 6Joux A. Multicollisions in Iterated hash functions[C]. CRYPTO 2004, Berlin: Springer- Verlag, 2004. LNCS: 3152, 306-316.
  • 7Kelsey J and Schneier B. Second preimages on n-bit hash functions for much less than 2" work[C]. Eurocrypt 2005, Berlin: Springer-Verlag, 2005, LNCS 3494: 19-35.
  • 8Kelsey J and Kohno T. Herding hash functions and the Nostradamus attacl[C]. Eurocrypt 2006, Berlin: Springer- Verlag, 2006, LNCS 4004: 183-200.
  • 9陈士伟,金晨辉.MD5碰撞攻击的多重消息修改技术的研究[J].通信学报,2009,30(8):89-95. 被引量:3

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部