Joux multicollisions attack in sponge construction

Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function usually has two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes of used in modern cryptographic hash functio...

Full description

Bibliographic Details
Main Authors: AlAhmad, Mohammad A., Alshaikhli, Imad Fakhri Taha, Nandi, Mridul
Format: Conference or Workshop Item
Language:English
Published: 2013
Subjects:
Online Access:http://irep.iium.edu.my/34344/
http://irep.iium.edu.my/34344/
http://irep.iium.edu.my/34344/
http://irep.iium.edu.my/34344/1/Joux_multicollisions_attack_in_Sponge_construction-IEEE.pdf
Description
Summary:Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function usually has two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes of used in modern cryptographic hash function. In this paper, we present multicollisions attack in sponge construction. In 2004, Joux [3] presented multicollision attack in iterated hash function. Our attack is similar to Joux attack but specifically for sponge construction1. We show that finding multicollisions in sponge construction of messages that hash to the same value, is not harder finding ordinary collisions. Then, we use this attack as a tool to prove that concatenating more than one hash function in order to increase the security level does not yield to more secure construction.