Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård

  • Authors:
  • Elena Andreeva;Charles Bouillaguet;Orr Dunkelman;John Kelsey

  • Affiliations:
  • ESAT/SCD -- COSIC, Dept. of Electrical Engineering, Katholieke Universiteit Leuven and IBBT,;Ecole Normale Supérieure,;Ecole Normale Supérieure,;National Institute of Standards and Technology,

  • Venue:
  • Selected Areas in Cryptography
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgård construction. We extend the herding attack to concatenated hashes, and to certain hash functions that process each message block several times. Using this technique, we show a second preimage attack on the folklore "hash-twice" construction which process two concatenated copies of the message. We follow with showing how to apply the herding attack to tree hashes. Finally, we present a new type of attack -- the trojan message attack, which allows for producing second preimages of unknown messages (from a small known space) when they are appended with a fixed suffix.