TY - RPRT
T1 - On hash functions using checksums
AU - Gauravaram, Praveen
AU - Kelsey, John
AU - Knudsen, Lars Ramkilde
AU - Thomsen, Søren Steffen
PY - 2008
Y1 - 2008
N2 - We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno, and the multicollision attack of
Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto'04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by
factors of at least $2^{26}$ and $2^{54}$, respectively.
AB - We analyse the security of iterated hash functions that compute an input dependent checksum which is processed as part of the hash computation. We show that a large class of such schemes, including those using non-linear or even one-way checksum functions, is not secure against the second preimage attack of Kelsey and Schneier, the herding attack of Kelsey and Kohno, and the multicollision attack of
Joux. Our attacks also apply to a large class of cascaded hash functions. Our second preimage attacks on the cascaded hash functions improve the results of Joux presented at Crypto'04. We also apply our attacks to the MD2 and GOST hash functions. Our second preimage attacks on the MD2 and GOST hash functions improve the previous best known short-cut second preimage attacks on these hash functions by
factors of at least $2^{26}$ and $2^{54}$, respectively.
KW - checksums
KW - multicollisions
KW - second preimage and herding attack
KW - Iterated hash functions
M3 - Report
T3 - MAT report
BT - On hash functions using checksums
ER -