Linearization attacks against syndrome based hashes

被引:0
|
作者
Saarinen, Markku-Juhani O. [1 ]
机构
[1] Univ London, Royal Holloway & Bedford New Coll, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007 | 2007年 / 4859卷
关键词
FSB; syndrome based hashes; provably secure hashes; hash function cryptanalysis; linearization attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In MyCrypt 2005, Augot, Finiasz, and Sendrier proposed FSB, a family of cryptographic hash functions. The security claim of the FSB hashes is based on a coding theory problem with hard average-case complexity. In the ECRYPT 2007 Hash Function Workshop, new versions with essentially the same compression function but radically different security parameters and an additional final transformation were presented. We show that hardness of average-case complexity of the underlying problem is irrelevant in collision search by presenting a linearization method that can be used to produce collisions in a matter of seconds on a desktop PC for the variant of FSB with claimed 2(128) security.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 50 条
  • [1] An Improvement of Linearization-Based Algebraic Attacks
    Ghost, Satrajit
    Das, Abhijit
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 157 - 167
  • [2] Quantum Linearization Attacks
    Bonnetain, Xavier
    Leurent, Gaetan
    Naya-Plasencia, Maria
    Schrottenloher, Andre
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 422 - 452
  • [3] Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
    Saarinen, Markku-Juhani Olavi
    FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 216 - 225
  • [4] Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems
    Strenzke, Falko
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2013, 2013, 7932 : 217 - 230
  • [5] Linearization-Based Quantized Stabilization of Nonlinear Systems Under DoS Attacks
    Kato, Rui
    Cetinkaya, Ahmet
    Ishii, Hideaki
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (12) : 6826 - 6833
  • [6] HoneyHash: Honeyword Generation Based on Transformed Hashes
    Shi, Canyang
    Sun, Huiping
    SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 161 - 173
  • [7] Image Matching Algorithm Based on Hashes Extraction
    Rivas, Alberto
    Chamoso, Pablo
    Martin-Limorti, Javier J.
    Rodriguez, Sara
    de la Prieta, Fernando
    Bajo, Javier
    PROGRESS IN ARTIFICIAL INTELLIGENCE (EPIA 2017), 2017, 10423 : 87 - 94
  • [8] On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices
    Asghar, Hassan Jameel
    Steinfeld, Ron
    Li, Shujun
    Kaafar, Mohamed Ali
    Pieprzyk, Josef
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) : 1643 - 1655
  • [9] Chameleon Hashes Without Key Exposure Based on Factoring
    Wei Gao
    Xue-Li Wang
    Dong-Qing Xie
    Journal of Computer Science and Technology, 2007, 22 : 109 - 113
  • [10] ATTACKS AGAINST
    SWANBERG, AV
    JAMA-JOURNAL OF THE AMERICAN MEDICAL ASSOCIATION, 1954, 156 (10): : 1009 - 1009