Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Moon, Dukjae | - |
dc.contributor.author | Hong, Deukjo | - |
dc.contributor.author | Kwon, Daesung | - |
dc.contributor.author | Hong, Seokhie | - |
dc.date.accessioned | 2021-09-06T16:59:06Z | - |
dc.date.available | 2021-09-06T16:59:06Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2012-08 | - |
dc.identifier.issn | 0916-8508 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/107742 | - |
dc.description.abstract | We assume that the domain extender is the Merkle-Damgard (MD) scheme and he message is padded by a '1', and minimum number of '0' s, followed by a fixed size length information so that the length of padded message is multiple of block length. Under this assumption, we analyze securities of the hash mode when the compression function follows the Davies-Meyer (DM) scheme and the underlying block cipher is one of the plain Feistel or Misty scheme or the generalized Feistel or Misty schemes with Substitution-Permutation (SP) round function. We do this work based on Meet-in-the-Middle (MitM) preimage attack techniques, and develop several useful initial structures. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.subject | MD4 | - |
dc.subject | COLLISIONS | - |
dc.title | Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.1587/transfun.E95.A.1379 | - |
dc.identifier.scopusid | 2-s2.0-84864769987 | - |
dc.identifier.wosid | 000308261100022 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E95A, no.8, pp.1379 - 1389 | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.title | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.volume | E95A | - |
dc.citation.number | 8 | - |
dc.citation.startPage | 1379 | - |
dc.citation.endPage | 1389 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | MD4 | - |
dc.subject.keywordPlus | COLLISIONS | - |
dc.subject.keywordAuthor | preimage attack | - |
dc.subject.keywordAuthor | hash mode | - |
dc.subject.keywordAuthor | Feistel scheme | - |
dc.subject.keywordAuthor | Misty scheme | - |
dc.subject.keywordAuthor | block cipher | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.