Security evaluation of double-block-length hash modes with preimage attacks on PGV schemes

Dukjae Moon, Deukjo Hong, Bonwook Koo, Seokhie Hong

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

In FSE 2011, Sasaki presented the preimage attacks on Davies-Meyer (DM) scheme of 7-round AES and explained conversion of it to the attack on the hash function for 12 secure PGV schemes. In this paper, we apply Sasaki's work to Double-Block-Length (DBL) hash modes based on arbitrary blockcipher. We generalize compression functions in several DBL hash modes. Assuming a Sasaki's preimage attack on DM scheme of the underlying blockcipher is faster than brute-force attack, we evaluate securities of the hash modes against preimage or second-preimage attacks. Hence, we analyzed the hash modes against preimage or second-preimage attacks except some case of the generalized MDC-4.

Original languageEnglish
Pages (from-to)497-508
Number of pages12
JournalJournal of Internet Technology
Volume14
Issue number3
DOIs
Publication statusPublished - 2013

Keywords

  • Blockcipher
  • Double-Block-Length hash mode
  • Preimage attack

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Security evaluation of double-block-length hash modes with preimage attacks on PGV schemes'. Together they form a unique fingerprint.

Cite this