This website does readability filtering of other pages. All styles, scripts, forms and ads are stripped. If you want your website excluded or have other feedback, use this form.

Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions – Bookmetrix Analysis

You're seeing our new discovery page and we'd like your opinion. Tell us your feedback.

Bookmetrix home

A list of tags associated with this document:

  • Chapter 19

Advances in Cryptology – CRYPTO 2004 (2004): Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions

Authors:
Antoine Joux

In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r -tuples of messages that all hash to the same value, is not much harder than finding ordinary collisions, i.e. pairs of messages, even for extremely large values of r . More precisely, the ratio of the complexities of the attacks is approximately equal to the logarithm of r . Then, using large multicollisions as a tool, we solve a long standing open problem and prove that concatenating the results of several iterated hash functions in order to build a larger one does not yield a secure construction. We also discuss the potential impact of our attack on several published schemes. Quite surprisingly, for subtle reasons, the schemes we study happen to be immune to our attack.

Metrics


Most Downloaded Chapters

Best performing chapters in Computer Science, sorted by

Purchase this book

Get this book

Advances in Cryptology – CRYPTO 2004 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions

This dialog will, depending on your institutional affiliation, allow you to purchase an ebook, purchase a print book, or download a PDF copy of the book.

When you click on the button below, you will be redirected to springer.com where you can finish shopping.

Download chapter as PDF Buy print edition

Chapter details

Part of book
Advances in Cryptology – CRYPTO 2004
Affiliation
DCSSI Crypto Lab, Paris 07 SP, France
DOI
10.1007/978-3-540-28628-8_19

This book is part of an eBook collection

Computer Science