Variants of multicollision attacks on iterated hash functions

  • Authors:
  • Tuomas Kortelainen;Juha Kortelainen;Kimmo Halunen

  • Affiliations:
  • Mathematics Division, Department of Electrical and Information Engineering, University of Oulu;Department of Information Processing Science, University of Oulu;Oulu University Secure Programming Group, Department of Electrical and Information Engineering, University of Oulu

  • Venue:
  • Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
  • Year:
  • 2010

Quantified Score

Hi-index 0.01

Visualization

Abstract

We introduce a statistical experiment setting to carry out a multicollision attack on any iterated hash function. We develop a method for finding multicollisions that gives larger multicollision sets for the same amount of work as Joux's famous method i.e. with 2.5ċk2n/2 work one can find greater than 2k-collisions for large k. Furthermore, if the message length is not restricted, we show that we can create arbitrarily large multicollisions by finding two cycles in the iterated hash function. This applies even when an ideal compression function is used.