Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Security Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes

Full metadata record
DC Field Value Language
dc.contributor.authorMoon, Dukjae-
dc.contributor.authorHong, Deukjo-
dc.contributor.authorKoo, Bonwook-
dc.contributor.authorHong, Seokhie-
dc.date.accessioned2021-09-06T02:14:03Z-
dc.date.available2021-09-06T02:14:03Z-
dc.date.created2021-06-18-
dc.date.issued2013-05-
dc.identifier.issn1607-9264-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/103431-
dc.description.abstractIn FSE 2011, Sasaki presented the preimage attacks on Davies-Meyer (DM) scheme of 7-round AES and explained conversion of it to the attack on the hash function for 12 secure PGV schemes. In this paper, we apply Sasaki's work to Double-Block-Length (DBL) hash modes based on arbitrary blockcipher. We generalize compression functions in several DBL hash modes. Assuming a Sasaki's preimage attack on DM scheme of the underlying blockcipher is faster than brute-force attack, we evaluate securities of the hash modes against preimage or second-preimage attacks. Hence, we analyzed the hash modes against preimage or second-preimage attacks except some case of the generalized MDC-4.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherLIBRARY & INFORMATION CENTER, NAT DONG HWA UNIV-
dc.subjectMD5-
dc.subjectCOLLISIONS-
dc.subjectFASTER-
dc.titleSecurity Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes-
dc.typeArticle-
dc.contributor.affiliatedAuthorHong, Seokhie-
dc.identifier.doi10.6138/JIT.2013.14.3.13-
dc.identifier.scopusid2-s2.0-84883168604-
dc.identifier.wosid000320291200014-
dc.identifier.bibliographicCitationJOURNAL OF INTERNET TECHNOLOGY, v.14, no.3, pp.497 - 508-
dc.relation.isPartOfJOURNAL OF INTERNET TECHNOLOGY-
dc.citation.titleJOURNAL OF INTERNET TECHNOLOGY-
dc.citation.volume14-
dc.citation.number3-
dc.citation.startPage497-
dc.citation.endPage508-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusMD5-
dc.subject.keywordPlusCOLLISIONS-
dc.subject.keywordPlusFASTER-
dc.subject.keywordAuthorPreimage attack-
dc.subject.keywordAuthorDouble-Block-Length hash mode-
dc.subject.keywordAuthorBlockcipher-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Hong, Seok hie photo

Hong, Seok hie
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE