On Diamond Structures and Trojan Message Attacks
نویسندگان
چکیده
The first part of this paper considers the diamond structures which were first introduced and applied in the herding attack by Kelsey and Kohno [7]. We present a new method for the construction of a diamond structure with 2 chaining values the message complexity of which is O(2 n+d 2 ) . Here n is the length of the compression function used. The aforementioned complexity was (with intuitive reasoning) suggested to be true in [7] and later disputed by Blackburn et al. in [3]. In the second part of our paper we give new, efficient variants for the two types of Trojan message attacks against Merkle-Damgård hash functions presented by Andreeva et al. [1] The message complexities of the Collision Trojan Attack and the stronger Herding Trojan Attack in [1] are O(2 n 2 ) and O(2 2n 3 +2 n 2 ) , respectively. Our variants of the above two attack types are the Weak Trojan Attack and the Strong Trojan Attack having the complexities O(2 n+r 2 ) and O(2 2n−s 3 + 2 n+r 2 ) , respectively. Here 2 is the cardinality of the prefix set and 2 is the length of the Trojan message in the Strong Trojan Attack.
منابع مشابه
On iteration-based security flaws in modern hash functions
The design principles proposed independently by both Ralph Merkle and Ivan Damgård in 1989 are applied widely in hash functions that are used in practice. The construction reads the message in one message block at a time and applies iteratively a compression function that, given a single message block and a hash value, outputs a new hash value. This iterative structure has some security weaknes...
متن کاملPublic-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks
Chosen Distribution Attacks (CDA) were introduced by Bellare et al. (Asiacrypt ’09) to model attacks where an adversary can control the distribution of both messages and random coins used in an encryption scheme. One important restriction in their definition is that the distributions chosen by the adversary cannot depend on the public key being attacked, and they show that some restriction of t...
متن کاملOn the complexity of the herding attack and some related attacks on hash functions
In this paper, we analyze the complexity of the construction of the 2-diamond structure proposed by Kelsey and Kohno [9]. We point out a flaw in their analysis and show that their construction may not produce the desired diamond structure. We then give a more rigorous and detailed complexity analysis of the construction of a diamond structure. For this, we appeal to random graph theory, which a...
متن کاملHerding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
In this paper we present new attack techniques to analyze the structure of hash functions that are not based on the classical Merkle Damg̊ard construction. We extend the herding attack to concatenated hashes, and to certain hash functions that process each message block several times. Using this technique, we show a second preimage attack on the folklore “hash-twice” construction which process ...
متن کاملSecure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کامل