New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity

Muhammad Barham, Orr Dunkelman, Stefan Lucks, Marc Stevens

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Dithered hash functions were proposed by Rivest as a method to mitigate second preimage attacks on Merkle-Damgård hash functions. Despite that, second preimage attacks against dithered hash functions were proposed by Andreeva et al., One issue with these second preimage attacks is their huge memory requirement in the precomputation and the online phases. In this paper, we present new second preimage attacks on the dithered Merkle-Damgård construction. These attacks consume significantly less memory in the online phase (with a negligible increase in the online time complexity) than previous attacks. For example, in the case of MD5 with the Keränen sequence, we reduce the memory complexity from about blocks to about (about 545, MB). We also present an essentially memoryless variant of Andreeva et al., attack. In case of MD5-Keränen or SHA1-Keränen, the offline and online memory complexity is message blocks (about 188–235, KB), at the expense of increasing the offline time complexity.

Original languageEnglish
Title of host publicationSelected Areas in Cryptography – SAC 2016 - 23rd International Conference, Revised Selected Papers
EditorsRoberto Avanzi, Howard Heys
PublisherSpringer Verlag
Pages247-263
Number of pages17
ISBN (Print)9783319694528
DOIs
StatePublished - 2017
Event23rd International Conference on Selected Areas in Cryptography, SAC 2016 - St. John's, Canada
Duration: 10 Aug 201612 Aug 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10532 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference23rd International Conference on Selected Areas in Cryptography, SAC 2016
Country/TerritoryCanada
CitySt. John's
Period10/08/1612/08/16

Bibliographical note

Publisher Copyright:
© 2017, Springer International Publishing AG.

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity'. Together they form a unique fingerprint.

Cite this