Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2

Publication: Research - peer-reviewConference article – Annual report year: 2010

Standard

Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2. / Guo, Jian; Ling, San; Wang, Huaxiong; Rechberger, Christian.

In: Lecture Notes in Computer Science, Vol. 6477, 2010, p. 56-75.

Publication: Research - peer-reviewConference article – Annual report year: 2010

Harvard

APA

CBE

MLA

Vancouver

Author

Guo, Jian; Ling, San; Wang, Huaxiong; Rechberger, Christian / Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2.

In: Lecture Notes in Computer Science, Vol. 6477, 2010, p. 56-75.

Publication: Research - peer-reviewConference article – Annual report year: 2010

Bibtex

@article{eb10656e55914cfa9b7edfddb73f014c,
title = "Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2",
keywords = "Hash functions, Security of data, Preimage, MD4, SHA-2, Cryptanalysis",
publisher = "Springer",
author = "Jian Guo and San Ling and Huaxiong Wang and Christian Rechberger",
year = "2010",
doi = "10.1007/978-3-642-17373-8_4",
volume = "6477",
pages = "56--75",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",

}

RIS

TY - CONF

T1 - Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2

A1 - Guo,Jian

A1 - Ling,San

A1 - Wang,Huaxiong

A1 - Rechberger,Christian

AU - Guo,Jian

AU - Ling,San

AU - Wang,Huaxiong

AU - Rechberger,Christian

PB - Springer

PY - 2010

Y1 - 2010

N2 - We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SHA-2, with the result on Tiger being the first cryptanalytic shortcut attack on the full hash function. Our attacks runs in time 2188.8 for finding preimages, and 2188.2 for second-preimages. Both have memory requirement of order 28, which is much less than in any other recent preimage attacks on reduced Tiger. Using pre-computation techniques, the time complexity for finding a new preimage or second-preimage for MD4 can now be as low as 278.4 and 2 69.4 MD4 computations, respectively. The second-preimage attack works for all messages longer than 2 blocks. To obtain these results, we extend the meet-in-the-middle framework recently developed by Aoki and Sasaki in a series of papers. In addition to various algorithm-specific techniques, we use a number of conceptually new ideas that are applicable to a larger class of constructions. Among them are (1) incorporating multi-target scenarios into the MITM framework, leading to faster preimages from pseudo-preimages, (2) a simple precomputation technique that allows for finding new preimages at the cost of a single pseudo-preimage, and (3) probabilistic initial structures, to reduce the attack time complexity. All the techniques developed await application to other hash functions. To illustrate this, we give as another example improved preimage attacks on SHA-2 members. © 2010 International Association for Cryptologic Research.

AB - We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SHA-2, with the result on Tiger being the first cryptanalytic shortcut attack on the full hash function. Our attacks runs in time 2188.8 for finding preimages, and 2188.2 for second-preimages. Both have memory requirement of order 28, which is much less than in any other recent preimage attacks on reduced Tiger. Using pre-computation techniques, the time complexity for finding a new preimage or second-preimage for MD4 can now be as low as 278.4 and 2 69.4 MD4 computations, respectively. The second-preimage attack works for all messages longer than 2 blocks. To obtain these results, we extend the meet-in-the-middle framework recently developed by Aoki and Sasaki in a series of papers. In addition to various algorithm-specific techniques, we use a number of conceptually new ideas that are applicable to a larger class of constructions. Among them are (1) incorporating multi-target scenarios into the MITM framework, leading to faster preimages from pseudo-preimages, (2) a simple precomputation technique that allows for finding new preimages at the cost of a single pseudo-preimage, and (3) probabilistic initial structures, to reduce the attack time complexity. All the techniques developed await application to other hash functions. To illustrate this, we give as another example improved preimage attacks on SHA-2 members. © 2010 International Association for Cryptologic Research.

KW - Hash functions

KW - Security of data

KW - Preimage

KW - MD4

KW - SHA-2

KW - Cryptanalysis

U2 - 10.1007/978-3-642-17373-8_4

DO - 10.1007/978-3-642-17373-8_4

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

VL - 6477

SP - 56

EP - 75

ER -