loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Shiwei Chen and Chenhui Jin

Affiliation: Institute of Information Science and Technology, China

Keyword(s): Hash functions, MD construction, MDP, Multicollisions, Second preimage attack, Computational complexity.

Related Ontology Subjects/Areas/Topics: Coding Theory and Practice ; Cryptographic Techniques and Key Management ; Information and Systems Security ; Mobile Code & Agent Security

Abstract: Using one kind of multicollsions of the Merkle-Damgard(MD) construction for hash functions proposed by Kelsey and Schneier, this paper presents a second preimage attack on MDP construction which is a simple variant ofMD scheme with a permutation for hash functions. Then we prove that the computational complexity of our second preimage attack is k ×2n/2+1 +2n−k less than 2n where n is the size of the hash value and 2k +k+1 is the length of the target message.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.137.176.213

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Chen, S. and Jin, C. (2009). A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS. In Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT; ISBN 978-989-674-005-4; ISSN 2184-3236, SciTePress, pages 245-248. DOI: 10.5220/0002230202450248

@conference{secrypt09,
author={Shiwei Chen. and Chenhui Jin.},
title={A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT},
year={2009},
pages={245-248},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002230202450248},
isbn={978-989-674-005-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT
TI - A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS
SN - 978-989-674-005-4
IS - 2184-3236
AU - Chen, S.
AU - Jin, C.
PY - 2009
SP - 245
EP - 248
DO - 10.5220/0002230202450248
PB - SciTePress