Title :
Cryptanalysis of Lin et al.´s Efficient Block-Cipher-Based Hash Function
Author :
Liu, Bozhong ; Gong, Zheng ; Chen, Xiaohong ; Qiu, Weidong ; Zheng, Dong
Author_Institution :
Sch. of Inf. Security Eng., Shanghai Jiao Tong Univ., Shanghai, China
Abstract :
Hash functions are widely used in authentication. In this paper, the security of Lin et al.´s efficient block-cipher-based hash function is reviewed. By using Joux´s multicollisions and Kelsey et al.´s expandable message techniques, we find the scheme is vulnerable to collision, preimage and second preimage attacks. Some modifications are recommended to avoid those security flaws in Lin et al.´s hash construction.
Keywords :
cryptography; Joux multicollision; block-cipher-based hash function; cryptanalysis; expandable message technique; hash construction; preimage attack; Authentication; Complexity theory; Construction industry; Cryptography; Resistance; Schedules;
Conference_Titel :
Internet Technology and Applications, 2010 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5142-5
Electronic_ISBN :
978-1-4244-5143-2
DOI :
10.1109/ITAPP.2010.5566639