Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in which a linear error-correcting code is used to build a wide-pipe compression function from underlying blockciphers operating in Davies-Meyer mode. In this paper, we (re)analyse the preimage resistance of the Knudsen-Preneel compression functions in the setting of public random functions. We give a new non-adaptive preimage attack, beating the one given by Knudsen and Preneel, that is optimal in terms of query complexity. Moreover, our new attack falsifies their (conjectured) preimage resistance security bound and shows that intuitive bounds based on the number of ‘active’ components can be treacherous. Complementing our attack is a formal analysis of the ...
International audienceMost cryptographic hash functions are iterated constructions, in which a mode ...
Hash functions are often constructed based on permutations or blockciphers, and security proofs are ...
Abstract. Most cryptographic hash functions are iterated construc-tions, in which a mode of operatio...
Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in whic...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
© International Association for Cryptologic Research 2015. Hash functions are often constructed base...
Hash functions are often constructed based on permutations or blockciphers, and security proofs are ...
Abstract. Hash functions are often constructed based on permutations or blockci-phers, and security ...
A public random function R: {0, 1}m → {0, 1}n is a function chosen uniformly at random from the set ...
After 15 years of unsuccessful cryptanalysis attempts by the research community, Grassl et al. have ...
International audienceMost cryptographic hash functions are iterated constructions, in which a mode ...
Mendel and Thomsen gave a preimage attack on JH-512 by finding a preimage through the collision sear...
International audienceMost cryptographic hash functions are iterated constructions, in which a mode ...
International audienceMost cryptographic hash functions are iterated constructions, in which a mode ...
Hash functions are often constructed based on permutations or blockciphers, and security proofs are ...
Abstract. Most cryptographic hash functions are iterated construc-tions, in which a mode of operatio...
Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in whic...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
© International Association for Cryptologic Research 2015. Hash functions are often constructed base...
Hash functions are often constructed based on permutations or blockciphers, and security proofs are ...
Abstract. Hash functions are often constructed based on permutations or blockci-phers, and security ...
A public random function R: {0, 1}m → {0, 1}n is a function chosen uniformly at random from the set ...
After 15 years of unsuccessful cryptanalysis attempts by the research community, Grassl et al. have ...
International audienceMost cryptographic hash functions are iterated constructions, in which a mode ...
Mendel and Thomsen gave a preimage attack on JH-512 by finding a preimage through the collision sear...
International audienceMost cryptographic hash functions are iterated constructions, in which a mode ...
International audienceMost cryptographic hash functions are iterated constructions, in which a mode ...
Hash functions are often constructed based on permutations or blockciphers, and security proofs are ...
Abstract. Most cryptographic hash functions are iterated construc-tions, in which a mode of operatio...