The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function

Dukjae MOON, Deukjo HONG, Daesung KWON, Seokhie HONG

  • Full Text Views

    0

  • Cite this

Summary :

We assume that the domain extender is the Merkle-Damgård (MD) scheme and he message is padded by a ‘1', and minimum number of ‘0' s, followed by a fixed size length information so that the length of padded message is multiple of block length. Under this assumption, we analyze securities of the hash mode when the compression function follows the Davies-Meyer (DM) scheme and the underlying block cipher is one of the plain Feistel or Misty scheme or the generalized Feistel or Misty schemes with Substitution-Permutation (SP) round function. We do this work based on Meet-in-the-Middle (MitM) preimage attack techniques, and develop several useful initial structures.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E95-A No.8 pp.1379-1389
Publication Date
2012/08/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E95.A.1379
Type of Manuscript
PAPER
Category
Cryptography and Information Security

Authors

Keyword