Security Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Moon, Dukjae | - |
dc.contributor.author | Hong, Deukjo | - |
dc.contributor.author | Koo, Bonwook | - |
dc.contributor.author | Hong, Seokhie | - |
dc.date.accessioned | 2021-09-06T02:14:03Z | - |
dc.date.available | 2021-09-06T02:14:03Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2013-05 | - |
dc.identifier.issn | 1607-9264 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/103431 | - |
dc.description.abstract | In FSE 2011, Sasaki presented the preimage attacks on Davies-Meyer (DM) scheme of 7-round AES and explained conversion of it to the attack on the hash function for 12 secure PGV schemes. In this paper, we apply Sasaki's work to Double-Block-Length (DBL) hash modes based on arbitrary blockcipher. We generalize compression functions in several DBL hash modes. Assuming a Sasaki's preimage attack on DM scheme of the underlying blockcipher is faster than brute-force attack, we evaluate securities of the hash modes against preimage or second-preimage attacks. Hence, we analyzed the hash modes against preimage or second-preimage attacks except some case of the generalized MDC-4. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | LIBRARY & INFORMATION CENTER, NAT DONG HWA UNIV | - |
dc.subject | MD5 | - |
dc.subject | COLLISIONS | - |
dc.subject | FASTER | - |
dc.title | Security Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.6138/JIT.2013.14.3.13 | - |
dc.identifier.scopusid | 2-s2.0-84883168604 | - |
dc.identifier.wosid | 000320291200014 | - |
dc.identifier.bibliographicCitation | JOURNAL OF INTERNET TECHNOLOGY, v.14, no.3, pp.497 - 508 | - |
dc.relation.isPartOf | JOURNAL OF INTERNET TECHNOLOGY | - |
dc.citation.title | JOURNAL OF INTERNET TECHNOLOGY | - |
dc.citation.volume | 14 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 497 | - |
dc.citation.endPage | 508 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | MD5 | - |
dc.subject.keywordPlus | COLLISIONS | - |
dc.subject.keywordPlus | FASTER | - |
dc.subject.keywordAuthor | Preimage attack | - |
dc.subject.keywordAuthor | Double-Block-Length hash mode | - |
dc.subject.keywordAuthor | Blockcipher | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.