Abstract
This paper analyzes the security of a hash mode recently proposed by Yi and Lam. Given a block cipher with m-bit block size and 2m-bit key, they build a hash function with 2m-bit outputs that can hash messages as fast as the underlying block cipher can encrypt. This construction was conjectured to have ideal security, i.e., to resist all collision attacks faster than brute force. We disprove this conjecture by presenting a collision attack that is substantially faster than brute force and which could even be considered practical for typical security parameters.
Cite
CITATION STYLE
Wagner, D. (2000). Cryptanalysis of the Yi-Lam hash. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1976, pp. 483–488). Springer Verlag. https://doi.org/10.1007/3-540-44448-3_37
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.