Differential analysis of hash functions and block ciphers: generalized approach
DOI:
https://doi.org/10.18372/2225-5036.21.8734Keywords:
information security, hash function, differential analysis, MD5, Feistel scheme, bitconditions, tuneling methodAbstract
Differential analysis approaches are powerful block cipher analysis methods. Similar methods are used for hash function analysis. This paper generalizes differential analysis of unbalanced Feistel scheme based hash functions and Feistel block ciphers. Obtained results demonstrate, despite on some similarity of differential analysis for cipher and hash functions, they have crucial differences, so the same security parameters may belong to different resistances to differential analysis of cipher and hash functions. These results allow generate additional constrictions on security parameters in hash functions which are under development now.References
Claude E. Shannon. Communication theory of secrecy systems. The Bell System Technical Journal, 28(4):656–715, October 1949.
Eli Biham & Adi Shamir. Differential cryptanalysis of des-like cryptosystems. In Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’90, pages 2–21, London, UK, UK, 1991. Springer-Verlag.
Kazumaro Aoki and Yu Sasaki. Selected areas in cryptography. chapter Preimage Attacks on One-Block MD4, 63-Step MD5 and More, pages 103–119. Springer-Verlag, Berlin, Heidelberg, 2009.
Marc Stevens, Arjen K. Lenstra & Benne de Weger. Chosen-prefix collisions for md5 and applications. IJACT, 2(4):322–359, 2012.
Ralph Charles Merkle. Secrecy, authentication, and public key systems. PhD thesis, Stanford, CA, USA, 1979. AAI8001972.
Tao Xie Fan, Bao Liu Deng, Guo Feng. Could the 1-msb input difference be the fastest collision attack for md5 ? Cryptology ePrint Archive, Report 2008/391, 2008. http://eprint.iacr.org/.
Vlastimil Klima. Tunnels in hash functions:
Md5 collisions within a minute. Cryptology ePrint Archive, Report 2006/105, 2006. http://eprint.iacr.org/.
Xiaoyun Wang & Hongbo Yu. How to break md5 and other hash functions. In In EUROCRYPT. Springer-Verlag, 2005.