Functional graphs and their applications in generic attacks on iterated hash constructions

We provide a survey about generic attacks on cryptographic hash constructions including hash-based message authentication codes and hash combiners. We look into attacks involving iteratively evaluating identical mappings many times. The functional graph of a random mapping also involves iteratively...

पूर्ण विवरण

ग्रंथसूची विवरण
मुख्य लेखकों: Bao, Zhenzhen, Wang, Lei, Guo, Jian
अन्य लेखक: School of Physical and Mathematical Sciences
स्वरूप: Journal Article
भाषा:English
प्रकाशित: 2019
विषय:
ऑनलाइन पहुंच:https://hdl.handle.net/10356/103977
http://hdl.handle.net/10220/49462
_version_ 1826112678977863680
author Bao, Zhenzhen
Wang, Lei
Guo, Jian
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Bao, Zhenzhen
Wang, Lei
Guo, Jian
author_sort Bao, Zhenzhen
collection NTU
description We provide a survey about generic attacks on cryptographic hash constructions including hash-based message authentication codes and hash combiners. We look into attacks involving iteratively evaluating identical mappings many times. The functional graph of a random mapping also involves iteratively evaluating the mapping. These attacks essentially exploit properties of the functional graph. We map the utilization space of those properties from numerous proposed known attacks, draw a comparison among classes of attacks about their advantages and limitations. We provide a systematic exposition of concepts of cycles, deep-iterate images, collisions and their roles in cryptanalysis of iterated hash constructions. We identify the inherent relationship between these concepts, such that case-by-case theories about them can be unified into one knowledge system, that is, theories on the functional graph of random mappings. We show that the properties of the cycle search algorithm, the chain evaluation algorithm and the collision search algorithm can be described based on statistic results on the functional graph. Thereby, we can provide different viewpoints to support previous beliefs on individual knowledge. In that, we invite more sophisticated analysis of the functional graph of random mappings and more future exploitations of its properties in cryptanalysis.
first_indexed 2024-10-01T03:10:43Z
format Journal Article
id ntu-10356/103977
institution Nanyang Technological University
language English
last_indexed 2024-10-01T03:10:43Z
publishDate 2019
record_format dspace
spelling ntu-10356/1039772023-02-28T19:23:17Z Functional graphs and their applications in generic attacks on iterated hash constructions Bao, Zhenzhen Wang, Lei Guo, Jian School of Physical and Mathematical Sciences Hash-Based MAC Functional Graph DRNTU::Science::Mathematics We provide a survey about generic attacks on cryptographic hash constructions including hash-based message authentication codes and hash combiners. We look into attacks involving iteratively evaluating identical mappings many times. The functional graph of a random mapping also involves iteratively evaluating the mapping. These attacks essentially exploit properties of the functional graph. We map the utilization space of those properties from numerous proposed known attacks, draw a comparison among classes of attacks about their advantages and limitations. We provide a systematic exposition of concepts of cycles, deep-iterate images, collisions and their roles in cryptanalysis of iterated hash constructions. We identify the inherent relationship between these concepts, such that case-by-case theories about them can be unified into one knowledge system, that is, theories on the functional graph of random mappings. We show that the properties of the cycle search algorithm, the chain evaluation algorithm and the collision search algorithm can be described based on statistic results on the functional graph. Thereby, we can provide different viewpoints to support previous beliefs on individual knowledge. In that, we invite more sophisticated analysis of the functional graph of random mappings and more future exploitations of its properties in cryptanalysis. Published version 2019-07-25T00:53:15Z 2019-12-06T21:23:51Z 2019-07-25T00:53:15Z 2019-12-06T21:23:51Z 2018 Journal Article Bao, Z., Guo, J., & Wang, L. (2018). Functional graphs and their applications in generic attacks on iterated hash constructions. IACR Transactions on Symmetric Cryptology, 2018(1), 201-253. doi:10.13154/tosc.v2018.i1.201-253 https://hdl.handle.net/10356/103977 http://hdl.handle.net/10220/49462 10.13154/tosc.v2018.i1.201-253 en IACR Transactions on Symmetric Cryptology © 2018 The Author(s). All rights reserved. This paper was published by Ruhr University Bochum in IACR Transactions on Symmetric Cryptology and is made available with permission of The Author(s). 53 p. application/pdf
spellingShingle Hash-Based MAC
Functional Graph
DRNTU::Science::Mathematics
Bao, Zhenzhen
Wang, Lei
Guo, Jian
Functional graphs and their applications in generic attacks on iterated hash constructions
title Functional graphs and their applications in generic attacks on iterated hash constructions
title_full Functional graphs and their applications in generic attacks on iterated hash constructions
title_fullStr Functional graphs and their applications in generic attacks on iterated hash constructions
title_full_unstemmed Functional graphs and their applications in generic attacks on iterated hash constructions
title_short Functional graphs and their applications in generic attacks on iterated hash constructions
title_sort functional graphs and their applications in generic attacks on iterated hash constructions
topic Hash-Based MAC
Functional Graph
DRNTU::Science::Mathematics
url https://hdl.handle.net/10356/103977
http://hdl.handle.net/10220/49462
work_keys_str_mv AT baozhenzhen functionalgraphsandtheirapplicationsingenericattacksoniteratedhashconstructions
AT wanglei functionalgraphsandtheirapplicationsingenericattacksoniteratedhashconstructions
AT guojian functionalgraphsandtheirapplicationsingenericattacksoniteratedhashconstructions