Some attacks against a double length hash proposal

  • Authors:
  • Lars R. Knudsen;Frédéric Muller

  • Affiliations:
  • Department of Mathematics, Technical University of Denmark, Lyngby, Denmark;DCSSI Crypto Lab, PARIS 07 SP

  • Venue:
  • ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

At FSE 2005, Nandi et al proposed a method to turn an n-bit compression function into a 2n-bit compression function. In the black-box model, the security of this double length hash proposal against collision attacks is proven, if no more than Ω(22n/3) oracle queries to the underlying n-bit function are made. We explore the security of this hash proposal regarding several classes of attacks. We describe a collision attack that matches the proven security bound and we show how to find preimages in time 2n. For optimum security the complexities of finding collisions and preimages for a 2n-bit compression function should be respectively of 2n and 22n. We also show that if the output is truncated to s≤ 2n bits, one can find collisions in time roughly 2s/3 and preimages in time roughly 2s/2. These attacks illustrate some important weaknesses of the FSE 2005 proposal, while none of them actually contradicts the proof of security.