Journal on Communications ›› 2016, Vol. 37 ›› Issue (8): 45-50.doi: 10.11959/j.issn.1000-436x.2016154

• Papers • Previous Articles     Next Articles

Trojan message attack on the concatenated hash functions

Shi-Wei CHEN1,2,INChen-Hui J1   

  1. 1 The Third College,PLA Information Engineering University,Zhengzhou 450002,China
    2 Science and Technology on Information Assurance Laboratory,Beijing 100072,China
  • Online:2016-08-25 Published:2016-09-01

Abstract:

The Trojan message attack was proposed by Andreeva,et al.aiming at the hash functions with MD structure.First it was applied on the hash function beyond MD structure,that was,concatenated hash.Utilizing the property of the concatenated hash,and combining the Joux's multicollision and the “diamond” structure with the depth of n?l,a Trojan message of the length n 2k· blocks for the 2n-bit concatenated hash was constructed,based on which a chosen-prefix Trojan message attack was first proposed.And the memory complexity of proposed attack is about 2l+2n?l+1+n·2k+1blocks and the time complexity is about O (n·2n+k+l·2l)computations of the compression function,much less than the ideal value O(n·22n+k).

Key words: hash functions, concatenated hash, Trojan message attack, multicollsion, complexity

No Suggested Reading articles found!