Meet-in-The-middle preimage attacks on hash modes of generalized feistel and misty schemes with SP round function

Dukjae Moon, Deukjo Hong, Daesung Kwon, Seokhie Hong

    Research output: Contribution to journalArticlepeer-review

    4 Citations (Scopus)

    Abstract

    We assume that the domain extender is the Merkle- Damgård (MD) scheme and he message is padded by a '1', and minimum number of '0' s, followed by a fixed size length information so that the length of padded message is multiple of block length. Under this assumption, we analyze securities of the hash mode when the compression function follows the Davies-Meyer (DM) scheme and the underlying block cipher is one of the plain Feistel or Misty scheme or the generalized Feistel or Misty schemes with Substitution-Permutation (SP) round function. We do this work based on Meet-in-The-Middle (MitM) preimage attack techniques, and develop several useful initial structures.

    Original languageEnglish
    Pages (from-to)1379-1389
    Number of pages11
    JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
    VolumeE95-A
    Issue number8
    DOIs
    Publication statusPublished - 2012 Aug

    Keywords

    • Block cipher
    • Feistel scheme
    • Hash mode
    • Misty scheme
    • Preimage attack

    ASJC Scopus subject areas

    • Signal Processing
    • Computer Graphics and Computer-Aided Design
    • Electrical and Electronic Engineering
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'Meet-in-The-middle preimage attacks on hash modes of generalized feistel and misty schemes with SP round function'. Together they form a unique fingerprint.

    Cite this