Second preimages for iterated hash functions and their implications on MACs

0Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this article, we focus on second preimages for iterated hash functions. More precisely, we introduce the notion of a b-block bypass which is closely related to the notion of second preimage but specifies additional properties. We will then give two examples of iterated hash functions to which this notion applies: a double-block length hash function and a single-block length hash function. Furthermore, we look at NMAC and HMAC and show the implications of a b-block bypass regarding forgery attacks. As a result it turns out that the impact of second preimages for NMAC and HMAC heavily depends on how the second preimages are constructed. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Pramstaller, N., Lamberger, M., & Rijmen, V. (2007). Second preimages for iterated hash functions and their implications on MACs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4586 LNCS, pp. 68–81). Springer Verlag. https://doi.org/10.1007/978-3-540-73458-1_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free