Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions
We provide a survey about generic attacks on cryptographic hash constructions including hash-based message authentication codes and hash combiners. We look into attacks involving iteratively evaluating identical mappings many times. The functional graph of a random mapping also involves iteratively...
Main Authors: | Zhenzhen Bao, Jian Guo, Lei Wang |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2018-03-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/850 |
Similar Items
-
Security Analysis of Zipper Hash Against Multicollisions Attacks
by: N. Bagheri
Published: (2012-06-01) -
Cryptanalysis of Haraka
by: Jérémy Jean
Published: (2016-12-01) -
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks
by: Fukang Liu, et al.
Published: (2021-03-01) -
Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock
by: Shiwei Chen, et al.
Published: (2018-01-01) -
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
by: Zhenzhen Bao, et al.
Published: (2020-01-01)