메뉴 건너뛰기




Volumn 6477 LNCS, Issue , 2010, Pages 56-75

Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2

Author keywords

Cryptanalysis; Hash function; MD4; Preimage; SHA 2; Tiger

Indexed keywords

SECURITY OF DATA;

EID: 78650822495     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-17373-8_4     Document Type: Conference Paper
Times cited : (72)

References (46)
  • 2
    • 78650828230 scopus 로고    scopus 로고
    • Rsync, http://rsync.samba.org/
    • Rsync
  • 4
    • 78650822827 scopus 로고    scopus 로고
    • 3-Sum Problem, http://en.wikipedia.org/wiki/3SUM
    • 3-Sum Problem
  • 5
    • 70350162850 scopus 로고    scopus 로고
    • TIGER: A Fast New Hash Function
    • Gollmann, D. (ed.) FSE 1996. Springer, Heidelberg
    • Anderson, R.J., Biham, E.: TIGER: A Fast New Hash Function. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 89-97. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1039 , pp. 89-97
    • Anderson, R.J.1    Biham, E.2
  • 6
    • 72449208565 scopus 로고    scopus 로고
    • Preimages for Step- Reduced SHA-2
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Aoki, K., Guo, J., Matusiewicz, K., Sasaki, Y., Wang, L.: Preimages for Step- Reduced SHA-2. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 578-597. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 578-597
    • Aoki, K.1    Guo, J.2    Matusiewicz, K.3    Sasaki, Y.4    Wang, L.5
  • 7
    • 70350302881 scopus 로고    scopus 로고
    • Meet-in-the-Middle Preimage Attacks Against Reduced SHA- 0 and SHA-1
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Aoki, K., Sasaki, Y.: Meet-in-the-Middle Preimage Attacks Against Reduced SHA- 0 and SHA-1. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 70-89. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 70-89
    • Aoki, K.1    Sasaki, Y.2
  • 8
    • 70350630742 scopus 로고    scopus 로고
    • Preimage Attacks on One-Block MD4, 63-Step MD5 and More
    • Avanzi, R., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
    • Aoki, K., Sasaki, Y.: Preimage Attacks on One-Block MD4, 63-Step MD5 and More. In: Avanzi, R., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103-119. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5381 , pp. 103-119
    • Aoki, K.1    Sasaki, Y.2
  • 9
    • 40649095740 scopus 로고    scopus 로고
    • Subquadratic algorithms for 3SUM
    • Baran, I., Demaine, E.D., Patrascu, M.: Subquadratic algorithms for 3SUM. Algorithmica 50(4), 584-596 (2008)
    • (2008) Algorithmica , vol.50 , Issue.4 , pp. 584-596
    • Baran, I.1    Demaine, E.D.2    Patrascu, M.3
  • 10
    • 33749576843 scopus 로고    scopus 로고
    • Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Barkan, E., Biham, E., Shamir, A.: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 1-21. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 1-21
    • Barkan, E.1    Biham, E.2    Shamir, A.3
  • 11
    • 50249095647 scopus 로고    scopus 로고
    • New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Biham, E.: New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 444-461. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 444-461
    • Biham, E.1
  • 12
    • 38049183978 scopus 로고    scopus 로고
    • Finding SHA-1 Characteristics: General Results and Applications
    • Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
    • De Cannière, C., Rechberger, C.: Finding SHA-1 Characteristics: General Results and Applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1-20. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 1-20
    • De Cannière, C.1    Rechberger, C.2
  • 13
    • 51849105110 scopus 로고    scopus 로고
    • Preimages for Reduced SHA-0 and SHA-1
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • De Cannière, C., Rechberger, C.: Preimages for Reduced SHA-0 and SHA-1. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 179-202. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 179-202
    • De Cannière, C.1    Rechberger, C.2
  • 14
    • 84947903609 scopus 로고    scopus 로고
    • The First Two Rounds of MD4 are Not One-Way
    • Vaudenay, S. (ed.) FSE 1998. Springer, Heidelberg
    • Dobbertin, H.: The First Two Rounds of MD4 are Not One-Way. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 284-292. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1372 , pp. 284-292
    • Dobbertin, H.1
  • 16
    • 78649830280 scopus 로고    scopus 로고
    • Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
    • ePrint Archive, Report 2010/016
    • Guo, J., Ling, S., Rechberger, C., Wang, H.: Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Cryptology ePrint Archive, Report 2010/016 (2010), http://eprint.iacr. org/2010/016.pdf
    • (2010) Cryptology
    • Guo, J.1    Ling, S.2    Rechberger, C.3    Wang, H.4
  • 19
    • 70350352267 scopus 로고    scopus 로고
    • Preimage Attacks on Reduced Tiger and SHA-2
    • Dunkelman, O. (ed.) Fast Software Encryption. Springer, Heidelberg
    • Isobe, T., Shibutani, K.: Preimage Attacks on Reduced Tiger and SHA-2. In: Dunkelman, O. (ed.) Fast Software Encryption. LNCS, vol. 5665, pp. 139-155. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5665 , pp. 139-155
    • Isobe, T.1    Shibutani, K.2
  • 20
    • 24944541563 scopus 로고    scopus 로고
    • n work
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • n work. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474-490. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 474-490
    • Kelsey, J.1    Schneier, B.2
  • 21
    • 70350364574 scopus 로고    scopus 로고
    • Meet-in-the-Middle Attacks on SHA-3 Candidates
    • Dunkelman, O. (ed.) Fast Software Encryption. Springer, Heidelberg
    • Khovratovich, D., Nikolic, I., Weinmann, R.-P.: Meet-in-the-Middle Attacks on SHA-3 Candidates. In: Dunkelman, O. (ed.) Fast Software Encryption. LNCS, vol. 5665, pp. 228-245. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5665 , pp. 228-245
    • Khovratovich, D.1    Nikolic, I.2    Weinmann, R.-P.3
  • 23
    • 84985820553 scopus 로고
    • Hash Function Based on Block Ciphers
    • Rueppel, R.A. (ed.) EUROCRYPT 1992. Springer, Heidelberg
    • Lai, X., Massey, J.L.: Hash Function Based on Block Ciphers. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 55-70. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.658 , pp. 55-70
    • Lai, X.1    Massey, J.L.2
  • 24
    • 78650839108 scopus 로고    scopus 로고
    • Second Preimages for SMASH
    • Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
    • Lamberger, M., Pramstaller, N., Rechberger, C., Rijmen, V.: Second Preimages for SMASH. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 101-111. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4377 , pp. 101-111
    • Lamberger, M.1    Pramstaller, N.2    Rechberger, C.3    Rijmen, V.4
  • 26
    • 38149073454 scopus 로고    scopus 로고
    • Message Freedom in MD4 and MD5 Collisions: Application to APOP
    • Biryukov, A. (ed.) FSE 2007. Springer, Heidelberg
    • Leurent, G.: Message Freedom in MD4 and MD5 Collisions: Application to APOP. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 309-328. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4593 , pp. 309-328
    • Leurent, G.1
  • 27
    • 50249175901 scopus 로고    scopus 로고
    • MD4 is Not One-Way
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Leurent, G.: MD4 is Not One-Way. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 412-428. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 412-428
    • Leurent, G.1
  • 28
    • 50249150778 scopus 로고    scopus 로고
    • A (Second) Preimage Attack on the GOST Hash Function
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Mendel, F., Pramstaller, N., Rechberger, C.: A (Second) Preimage Attack on the GOST Hash Function. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 224-234. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 224-234
    • Mendel, F.1    Pramstaller, N.2    Rechberger, C.3
  • 29
    • 51849136016 scopus 로고    scopus 로고
    • Cryptanalysis of the GOST Hash Function
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Mendel, F., Pramstaller, N., Rechberger, C., Kontak, M., Szmidt, J.: Cryptanalysis of the GOST Hash Function. In:Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 162-178. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 162-178
    • Mendel, F.1    Pramstaller, N.2    Rechberger, C.3    Kontak, M.4    Szmidt, J.5
  • 30
    • 38149053275 scopus 로고    scopus 로고
    • Update on Tiger
    • Barua, R., Lange, T. (eds.) INDOCRYPT 2006. Springer, Heidelberg
    • Mendel, F., Preneel, B., Rijmen, V., Yoshida, H., Watanabe, D.: Update on Tiger. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 63-79. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4329 , pp. 63-79
    • Mendel, F.1    Preneel, B.2    Rijmen, V.3    Yoshida, H.4    Watanabe, D.5
  • 31
    • 38149133737 scopus 로고    scopus 로고
    • Cryptanalysis of the Tiger Hash Function
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Mendel, F., Rijmen, V.: Cryptanalysis of the Tiger Hash Function. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 536-550. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 536-550
    • Mendel, F.1    Rijmen, V.2
  • 32
    • 38149012340 scopus 로고    scopus 로고
    • Weaknesses in the HAS-V Compression Function
    • Nam, K.-H., Rhee, G. (eds.) ICISC 2007. Springer, Heidelberg
    • Mendel, F., Rijmen, V.:Weaknesses in the HAS-V Compression Function. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 335-345. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4817 , pp. 335-345
    • Mendel, F.1    Rijmen, V.2
  • 34
    • 26444553252 scopus 로고    scopus 로고
    • The MD2 Hash Function Is Not One-Way
    • Lee, P.J. (ed.) ASIACRYPT 2004. Springer, Heidelberg
    • Muller, F.: The MD2 Hash Function Is Not One-Way. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 214-229. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3329 , pp. 214-229
    • Muller, F.1
  • 35
    • 33745822369 scopus 로고    scopus 로고
    • Improved Collision Attack on MD4 with Probability Almost 1
    • Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
    • Naito, Y., Sasaki, Y., Kunihiro, N., Ohta, K.: Improved Collision Attack on MD4 with Probability Almost 1. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 129-145. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3935 , pp. 129-145
    • Naito, Y.1    Sasaki, Y.2    Kunihiro, N.3    Ohta, K.4
  • 36
    • 58349091571 scopus 로고    scopus 로고
    • Preimage attacks on 3, 4, and 5-pass HAVAL
    • Pieprzyk, J.P. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Sasaki, Y., Aoki, K.: Preimage attacks on 3, 4, and 5-pass HAVAL. In: Pieprzyk, J.P. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 253-271. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 253-271
    • Sasaki, Y.1    Aoki, K.2
  • 37
    • 67650679771 scopus 로고    scopus 로고
    • Finding Preimages in Full MD5 Faster than Exhaustive Search
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Sasaki, Y., Aoki, K.: Finding Preimages in Full MD5 Faster than Exhaustive Search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 134-152. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5479 , pp. 134-152
    • Sasaki, Y.1    Aoki, K.2
  • 38
    • 43149097854 scopus 로고    scopus 로고
    • Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
    • Malkin, T. (ed.) CT-RSA 2008. Springer, Heidelberg
    • Sasaki, Y., Wang, L., Ohta, K., Kunihiro, N.: Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 1-18. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4964 , pp. 1-18
    • Sasaki, Y.1    Wang, L.2    Ohta, K.3    Kunihiro, N.4
  • 39
    • 38049156019 scopus 로고    scopus 로고
    • Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
    • Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
    • Stevens, M., Lenstra, A.K., de Weger, B.: Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 1-22. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 1-22
    • Stevens, M.1    Lenstra, A.K.2    De Weger, B.3
  • 40
    • 70350346082 scopus 로고    scopus 로고
    • Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B.: Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 55-69. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 55-69
    • Stevens, M.1    Sotirov, A.2    Appelbaum, J.3    Lenstra, A.4    Molnar, D.5    Osvik, D.A.6    De Weger, B.7
  • 41
    • 84948973102 scopus 로고
    • On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER
    • Preneel, B. (ed.) FSE 1994. Springer, Heidelberg
    • Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 286-297. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.1008 , pp. 286-297
    • Vaudenay, S.1
  • 42
    • 77954696858 scopus 로고    scopus 로고
    • Finding Preimages of Tiger Up to 23 Steps
    • Hong, S., Iwata, T. (eds.) FSE 2010. Springer, Heidelberg
    • Wang, L., Sasaki, Y.: Finding Preimages of Tiger Up to 23 Steps. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 116-133. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6147 , pp. 116-133
    • Wang, L.1    Sasaki, Y.2
  • 43
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the Hash Functions MD4 and RIPEMD
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 44
    • 33745171465 scopus 로고    scopus 로고
    • Finding Collisions in the Full SHA-1
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 45
    • 24944591357 scopus 로고    scopus 로고
    • How to Break MD5 and Other Hash Functions
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 46
    • 33744827107 scopus 로고    scopus 로고
    • The Second-Preimage Attack on MD4
    • Desmedt, Y., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. Springer, Heidelberg
    • Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 1-12. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3810 , pp. 1-12
    • Yu, H.1    Wang, G.2    Zhang, G.3    Wang, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.