A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS
Shiwei Chen, Chenhui Jin
2009
Abstract
Using one kind of multicollsions of the Merkle-Damgard(MD) construction for hash functions proposed by Kelsey and Schneier, this paper presents a second preimage attack on MDP construction which is a simple variant ofMD scheme with a permutation for hash functions. Then we prove that the computational complexity of our second preimage attack is k ×2n/2+1 +2n−k less than 2n where n is the size of the hash value and 2k +k+1 is the length of the target message.
DownloadPaper Citation
in Harvard Style
Chen S. and Jin C. (2009). A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 245-248. DOI: 10.5220/0002230202450248
in Bibtex Style
@conference{secrypt09,
author={Shiwei Chen and Chenhui Jin},
title={A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={245-248},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002230202450248},
isbn={978-989-674-005-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS
SN - 978-989-674-005-4
AU - Chen S.
AU - Jin C.
PY - 2009
SP - 245
EP - 248
DO - 10.5220/0002230202450248