On hash functions using checksums

Publication: Research - peer-reviewReport – Annual report year: 2008

Standard

On hash functions using checksums. / Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen.

2008. (MAT report; No. 2008-06).

Publication: Research - peer-reviewReport – Annual report year: 2008

Harvard

APA

CBE

MLA

Gauravaram, Praveen et al. On hash functions using checksums 2008. (MAT report; Journal number 2008-06).

Vancouver

Gauravaram P, Kelsey J, Knudsen LR, Thomsen SS. On hash functions using checksums. 2008. (MAT report; No. 2008-06).

Author

Gauravaram, Praveen; Kelsey, John; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen / On hash functions using checksums.

2008. (MAT report; No. 2008-06).

Publication: Research - peer-reviewReport – Annual report year: 2008

Bibtex

@book{b381bc64e8cb4d2aa5848739e381c57d,
title = "On hash functions using checksums",
keywords = "checksums, multicollisions, second preimage and herding attack, Iterated hash functions",
author = "Praveen Gauravaram and John Kelsey and Knudsen, {Lars Ramkilde} and Thomsen, {Søren Steffen}",
year = "2008",
series = "MAT report",

}

RIS

TY - RPRT

T1 - On hash functions using checksums

A1 - Gauravaram,Praveen

A1 - Kelsey,John

A1 - Knudsen,Lars Ramkilde

A1 - Thomsen,Søren Steffen

AU - Gauravaram,Praveen

AU - Kelsey,John

AU - Knudsen,Lars Ramkilde

AU - Thomsen,Søren Steffen

PY - 2008

Y1 - 2008

N2 - We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno, and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto'04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least $2^{26}$ and $2^{54}$, respectively.

AB - We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno, and the multicollision attack of Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto'04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by factors of at least $2^{26}$ and $2^{54}$, respectively.

KW - checksums

KW - multicollisions

KW - second preimage and herding attack

KW - Iterated hash functions

BT - On hash functions using checksums

T3 - MAT report

T3 - en_GB

ER -