Security evaluation of double-block-length hash modes with preimage attacks on PGV schemes

Dukjae Moon, Deukjo Hong, Bonwook Koo, Seokhie Hong

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)

    Abstract

    In FSE 2011, Sasaki presented the preimage attacks on Davies-Meyer (DM) scheme of 7-round AES and explained conversion of it to the attack on the hash function for 12 secure PGV schemes. In this paper, we apply Sasaki's work to Double-Block-Length (DBL) hash modes based on arbitrary blockcipher. We generalize compression functions in several DBL hash modes. Assuming a Sasaki's preimage attack on DM scheme of the underlying blockcipher is faster than brute-force attack, we evaluate securities of the hash modes against preimage or second-preimage attacks. Hence, we analyzed the hash modes against preimage or second-preimage attacks except some case of the generalized MDC-4.

    Original languageEnglish
    Pages (from-to)497-508
    Number of pages12
    JournalJournal of Internet Technology
    Volume14
    Issue number3
    DOIs
    Publication statusPublished - 2013

    Keywords

    • Blockcipher
    • Double-Block-Length hash mode
    • Preimage attack

    ASJC Scopus subject areas

    • Software
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Security evaluation of double-block-length hash modes with preimage attacks on PGV schemes'. Together they form a unique fingerprint.

    Cite this