Security of iterated hash functions based on block ciphers

40Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.

Abstract

Cryptographic hash functions obtained by iterating a round function constructed from a block cipher and for which the hash-code length is twice the block length m of the underlying block cipher are considered. The computational security of such hash functions against two particular attacks, namely, the free-start target and free-start collision attacks, is investigated; these two attacks differentiate themselves from the “usual” target and colliiion attacks by not specifying the initial value of the iterations. The motivation is that computationally secure iterated hash functions against these two particular attacks implies computationally secure iterated hash functions against the “usual” target and collision attacks. For a general class of such 2m-bit iterated hash functions, tighter upper bounds than the one yet published in the literature on the complexity of free-start target and free-start collision attacks are derived. A proposal for a am-bit iterated hash function achieving these upper bounds is made; this new proposal is shown to be computationally more secure against free-start target and free-start collision attacks than some of the already proposed schemes falling into this general class. It is also shown that our proposal is better than the present proposal for an IS0 standard in the sense that both schemes achieve these upper bounds but one encryption is required in our proposal for hashing one m-bit message block as opposed to two encryptions in the IS0 proposal. Finally, two new attacks on the LOKI Double-Block-Hash function are pIesented with lower complexities than the known ones.

References Powered by Scopus

A design principle for hash functions

756Citations
N/AReaders
Get full text

Universal one-way hash functions and their cryptographic applications

639Citations
N/AReaders
Get full text

One way hash functions and DES

571Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Hash functions and RFID tags: Mind the gap

155Citations
N/AReaders
Get full text

Some plausible constructions of double-block-length hash functions

115Citations
N/AReaders
Get full text

Cryptographic hash functions

104Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Hohl, W., Lai, X., Meier, T., & Waldvogel, C. (1994). Security of iterated hash functions based on block ciphers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 773 LNCS, pp. 379–390). Springer Verlag. https://doi.org/10.1007/3-540-48329-2_32

Readers over time

‘10‘11‘12‘13‘14‘15‘16‘17‘18‘19‘20‘21‘23‘2402468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 22

65%

Professor / Associate Prof. 5

15%

Researcher 4

12%

Lecturer / Post doc 3

9%

Readers' Discipline

Tooltip

Computer Science 26

74%

Mathematics 4

11%

Engineering 3

9%

Physics and Astronomy 2

6%

Save time finding and organizing research with Mendeley

Sign up for free
0