A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD
SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS
Shiwei Chen and Chenhui Jin
Institute of Information Science and Technology, Zhengzhou 450004, China
Keywords:
Hash functions, MD construction, MDP, Multicollisions, Second preimage attack, Computational complexity.
Abstract:
Using one kind of multicollsions of the Merkle-Damgard(MD) construction for hash functions proposed by
Kelsey and Schneier, this paper presents a second preimage attack on MDP construction which is a simple
variant of MD scheme with a permutation for hash functions. Then we prove that the computational complexity
of our second preimage attack is k × 2
n/2+1
+ 2
n−k
less than 2
n
where n is the size of the hash value and
2
k
+ k+ 1 is the length of the target message.
1 INTRODUCTION
A cryptographic hash function H maps a message M
with arbitrary length to a fixed-length hash value h.
It has to satisfy the following three security require-
ments:
- Preimage resistance: For a given hash value h,
it is computationally infeasible to find a message M
such that h = H(M);
- Second preimage resistance: For a given mes-
sage M, it is computationally infeasible to find a sec-
ond message M
′
6= M such that H(M
′
) = H(M);
- Collision resistance: It is computationally infea-
sible to find two different messages M
′
and M such
that H(M
′
) = H(M).
The resistance of a hash function to collision at-
tack or second preimage attack mainly depends on the
size n of the hash value. Regardless of how a hash
function is designed, an adversary will always be able
to find a preimage or a second preimage after trying
2
n
different messages, or find a collision pair after
2
n/2
trials according to the birthday attack. There-
fore, if the computational complexity of finding a col-
lision pair or a (second) preimage for a particular hash
function is less than what could be expected based
on the size of the hash value, then the hash function
is considered to be broken. Generally, a hash func-
tion includes two parts, that is, the compression func-
tion which maps a fixed-length value to a fixed-length
value, and the domain extension transform which can
transfer a message with arbitrary length to a fixed-
length hash value. Aimed to these two parts, the re-
sults of analyzing on hash functions can be divided
into two kinds:
- Cryptanalytic attacks: Mainly apply to the com-
pression functions of the hash functions. Using the
internal properties of the compression functions, an
adversary can attack the hash functions. For exam-
ple, the collision attacks on MD-family proposed in
(Xiaoyun and Hongbo, 2005);
- Generic attacks: Apply to the domain extension
transforms directly with some assumptions on the
compression functions. Examples are long-message
second preimage attack(Kelsey and Schneier, 2005),
herding attack(Kelsey and Kohno, 2006) and the at-
tack on the MD with XOR-linear/additive checksum
in (Gauravaram and Kelsey, 2007).
Since Wang et al.(Xiaoyun and Hongbo, 2005)
presented the collision attacks on MD-family hash
functions and the recent results on the MD con-
struction, some cryptographers have been trying to
propose new domain extension transforms for hash
functions, such as MD with XOR-linear/additive
checksum(Gauravaram and Kelsey, 2007), ChopMD
construction (Coron et al., 2005), EMD construc-
tion(Bellare and Ristenpart, 2006), MD with a per-
mutation (MDP)(Hirose and Park, 2007), and so
on. In 2007, Praveen Gauravaram and John Kelsey
(Gauravaram and Kelsey, 2007) pointed out that the
MD with XOR-linear/additive checksum construc-
tion gained almost no security against generic at-
tacks. Coron et al.(Coron et al., 2005) presented
that the prefix-free MD and ChopMD were indiffer-
entiable from a random oracle and gave out the se-
curity bounds. However, Mihir Bellare and Thomas
Ristenpart(Bellare and Ristenpart, 2006) proved that
245
Chen S. and Jin C. (2009).
A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS.
In Proceedings of the International Conference on Security and Cryptography, pages 245-248
DOI: 10.5220/0002230202450248
Copyright
c
SciTePress