We expand a previous result of Dean [Dea99] to provide a second preimage attack on all n-bit iterated hash functions with Damgård-Merkle strengthening and n-bit intermediate states, allowing a second preimage to be found for a 2k-message-block message with about k × 2 n/2+1 + 2n-k+1 work. Using RIPEMD-160 as an example, our attack can find a second preimage for a 260 byte message in about 2106 work, rather than the previously expected 2160 work. We also provide slightly cheaper ways to find multicollisions than the method of Joux [Jou04]. Both of these results are based on expandable messages-patterns for producing messages of varying length, which all collide on the intermediate hash result immediately after processing the message. We provide an algorithm for finding expandable messages for any n-bit hash function built using the Damgård-Merkle construction, which requires only a small multiple of the work done to find a single collision in the hash function. © International Association for Cryptologic Research 2005.
CITATION STYLE
Kelsey, J., & Schneier, B. (2005). Second preimages on n-bit hash functions for much less than 2n work. In Lecture Notes in Computer Science (Vol. 3494, pp. 474–490). Springer Verlag. https://doi.org/10.1007/11426639_28
Mendeley helps you to discover research relevant for your work.