Full cryptanalysis of LPS and Morgenstern hash functions

22Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Collisions in the LPS cryptographic hash function of Charles, Goren and Lauter have been found by Zémor and Tillich [17], but it was not clear whether computing preimages was also easy for this hash function. We present a probabilistic polynomial time algorithm solving this problem. Subsequently, we study the Morgenstern hash, an interesting variant of LPS hash, and break this function as well. Our attacks build upon the ideas of Zémor and Tillich but are not straightforward extensions of it. Finally, we discuss fixes for the Morgenstern hash function and other applications of our results. © Springer-Verlag Berlin Heidelberg 2008.

Cite

CITATION STYLE

APA

Petit, C., Lauter, K., & Quisquater, J. J. (2008). Full cryptanalysis of LPS and Morgenstern hash functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5229 LNCS, pp. 263–277). https://doi.org/10.1007/978-3-540-85855-3_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free