Security evaluation of double-block-length hash modes with preimage attacks on PGV schemes

Dukjae Moon, Deukjo Hong, Bonwook Koo, Seokhie Hong

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

In FSE 2011, Sasaki presented the preimage attacks on Davies-Meyer (DM) scheme of 7-round AES and explained conversion of it to the attack on the hash function for 12 secure PGV schemes. In this paper, we apply Sasaki's work to Double-Block-Length (DBL) hash modes based on arbitrary blockcipher. We generalize compression functions in several DBL hash modes. Assuming a Sasaki's preimage attack on DM scheme of the underlying blockcipher is faster than brute-force attack, we evaluate securities of the hash modes against preimage or second-preimage attacks. Hence, we analyzed the hash modes against preimage or second-preimage attacks except some case of the generalized MDC-4.

Original languageEnglish
Pages (from-to)497-508
Number of pages12
JournalJournal of Internet Technology
Volume14
Issue number3
DOIs
Publication statusPublished - 2013 Sep 3

Fingerprint

Hash functions

Keywords

  • Blockcipher
  • Double-Block-Length hash mode
  • Preimage attack

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Cite this

Security evaluation of double-block-length hash modes with preimage attacks on PGV schemes. / Moon, Dukjae; Hong, Deukjo; Koo, Bonwook; Hong, Seokhie.

In: Journal of Internet Technology, Vol. 14, No. 3, 03.09.2013, p. 497-508.

Research output: Contribution to journalArticle

@article{ef811ef487e5452cbeb1350f1a91fad3,
title = "Security evaluation of double-block-length hash modes with preimage attacks on PGV schemes",
abstract = "In FSE 2011, Sasaki presented the preimage attacks on Davies-Meyer (DM) scheme of 7-round AES and explained conversion of it to the attack on the hash function for 12 secure PGV schemes. In this paper, we apply Sasaki's work to Double-Block-Length (DBL) hash modes based on arbitrary blockcipher. We generalize compression functions in several DBL hash modes. Assuming a Sasaki's preimage attack on DM scheme of the underlying blockcipher is faster than brute-force attack, we evaluate securities of the hash modes against preimage or second-preimage attacks. Hence, we analyzed the hash modes against preimage or second-preimage attacks except some case of the generalized MDC-4.",
keywords = "Blockcipher, Double-Block-Length hash mode, Preimage attack",
author = "Dukjae Moon and Deukjo Hong and Bonwook Koo and Seokhie Hong",
year = "2013",
month = "9",
day = "3",
doi = "10.6138/JIT.2013.14.3.13",
language = "English",
volume = "14",
pages = "497--508",
journal = "Journal of Internet Technology",
issn = "1607-9264",
publisher = "Taiwan Academic Network Management Committee",
number = "3",

}

TY - JOUR

T1 - Security evaluation of double-block-length hash modes with preimage attacks on PGV schemes

AU - Moon, Dukjae

AU - Hong, Deukjo

AU - Koo, Bonwook

AU - Hong, Seokhie

PY - 2013/9/3

Y1 - 2013/9/3

N2 - In FSE 2011, Sasaki presented the preimage attacks on Davies-Meyer (DM) scheme of 7-round AES and explained conversion of it to the attack on the hash function for 12 secure PGV schemes. In this paper, we apply Sasaki's work to Double-Block-Length (DBL) hash modes based on arbitrary blockcipher. We generalize compression functions in several DBL hash modes. Assuming a Sasaki's preimage attack on DM scheme of the underlying blockcipher is faster than brute-force attack, we evaluate securities of the hash modes against preimage or second-preimage attacks. Hence, we analyzed the hash modes against preimage or second-preimage attacks except some case of the generalized MDC-4.

AB - In FSE 2011, Sasaki presented the preimage attacks on Davies-Meyer (DM) scheme of 7-round AES and explained conversion of it to the attack on the hash function for 12 secure PGV schemes. In this paper, we apply Sasaki's work to Double-Block-Length (DBL) hash modes based on arbitrary blockcipher. We generalize compression functions in several DBL hash modes. Assuming a Sasaki's preimage attack on DM scheme of the underlying blockcipher is faster than brute-force attack, we evaluate securities of the hash modes against preimage or second-preimage attacks. Hence, we analyzed the hash modes against preimage or second-preimage attacks except some case of the generalized MDC-4.

KW - Blockcipher

KW - Double-Block-Length hash mode

KW - Preimage attack

UR - http://www.scopus.com/inward/record.url?scp=84883168604&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84883168604&partnerID=8YFLogxK

U2 - 10.6138/JIT.2013.14.3.13

DO - 10.6138/JIT.2013.14.3.13

M3 - Article

AN - SCOPUS:84883168604

VL - 14

SP - 497

EP - 508

JO - Journal of Internet Technology

JF - Journal of Internet Technology

SN - 1607-9264

IS - 3

ER -