TY - GEN
T1 - Herding, second preimage and trojan message attacks beyond merkle-damgård
AU - Andreeva, Elena
AU - Bouillaguet, Charles
AU - Dunkelman, Orr
AU - Kelsey, John
PY - 2009
Y1 - 2009
N2 - In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgård construction. We extend the herding attack to concatenated hashes, and to certain hash functions that process each message block several times. Using this technique, we show a second preimage attack on the folklore "hash-twice" construction which process two concatenated copies of the message. We follow with showing how to apply the herding attack to tree hashes. Finally, we present a new type of attack - the trojan message attack, which allows for producing second preimages of unknown messages (from a small known space) when they are appended with a fixed suffix.
AB - In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle-Damgård construction. We extend the herding attack to concatenated hashes, and to certain hash functions that process each message block several times. Using this technique, we show a second preimage attack on the folklore "hash-twice" construction which process two concatenated copies of the message. We follow with showing how to apply the herding attack to tree hashes. Finally, we present a new type of attack - the trojan message attack, which allows for producing second preimages of unknown messages (from a small known space) when they are appended with a fixed suffix.
KW - Concatenated hash
KW - Herding attack
KW - Second preimage attack
KW - Tree hash
KW - Trojan message attack
KW - Zipper hash
UR - http://www.scopus.com/inward/record.url?scp=70549095315&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-05445-7_25
DO - 10.1007/978-3-642-05445-7_25
M3 - Conference contribution
AN - SCOPUS:70549095315
SN - 3642054439
SN - 9783642054433
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 393
EP - 414
BT - Selected Areas in Cryptography - 16th Annual International Workshop, SAC 2009, Revised Selected Papers
T2 - 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009
Y2 - 13 August 2009 through 14 August 2009
ER -