Mitigating collision and preimage attacks against the generalized MDC-2 mode of operation

Shay Gueron, Michael E. Kounavis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper proposes a set of mechanisms for enhancing the security of the generalized MDC-2 mode of operation. The MDC-2 [4] mode is used for constructing a double length hash function, using block cipher building blocks, and is believed to provide some collision resistance [4], [10]. Recently, several attacks on MDC-2 have been published - collision, first and second pre-image attacks, with complexity below the ideal [2], [7], [8]. In this paper we analyze the root-cause of these attacks, as applied to the generalized MDC-2 mode, and propose techniques for mitigating them. By mitigating we mean that with our amendments the attacks are either not applicable, or their complexity is pushed to ideal.

Original languageEnglish
Title of host publicationIEEE Symposium on Computers and Communications, ISCC 2010
Pages196-201
Number of pages6
DOIs
StatePublished - 2010
Externally publishedYes
Event15th IEEE Symposium on Computers and Communications, ISCC 2010 - Riccione, Italy
Duration: 22 Jun 201025 Jun 2010

Publication series

NameProceedings - IEEE Symposium on Computers and Communications
ISSN (Print)1530-1346

Conference

Conference15th IEEE Symposium on Computers and Communications, ISCC 2010
Country/TerritoryItaly
CityRiccione
Period22/06/1025/06/10

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • General Mathematics
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Mitigating collision and preimage attacks against the generalized MDC-2 mode of operation'. Together they form a unique fingerprint.

Cite this