On diamond structures and Trojan message attacks

10Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The first part of this paper considers the diamond structures which were first introduced and applied in the herding attack by Kelsey and Kohno [7]. We present a new method for the construction of a diamond structure with 2 d chaining values the message complexity of which is O(2 n+d/2). Here n is the length of the compression function used. The aforementioned complexity was (with intuitive reasoning) suggested to be true in [7] and later disputed by Blackburn et al. in [3]. In the second part of our paper we give new, efficient variants for the two types of Trojan message attacks against Merkle-Damgård hash functions presented by Andreeva et al. [1] The message complexities of the Collision Trojan Attack and the stronger Herding Trojan Attack in [1] are O(2n/2+r) and O(22n/3 + 2n/2+r), respectively. Our variants of the above two attack types are the Weak Trojan Attack and the Strong Trojan Attack having the complexities O(2n+r/2) and O(22n-s/3) + 2n+r/2), respectively. Here 2r is the cardinality of the prefix set and 2 s is the length of the Trojan message in the Strong Trojan Attack. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Kortelainen, T., & Kortelainen, J. (2013). On diamond structures and Trojan message attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8270 LNCS, pp. 524–539). https://doi.org/10.1007/978-3-642-42045-0_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free