Multicollisions in sponge construction
Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function is built using two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes used in modern cryptographic hash functio...
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/34357/ http://irep.iium.edu.my/34357/ http://irep.iium.edu.my/34357/ http://irep.iium.edu.my/34357/1/icicm13-paper.pdf |
id |
iium-34357 |
---|---|
recordtype |
eprints |
spelling |
iium-343572014-01-16T08:17:31Z http://irep.iium.edu.my/34357/ Multicollisions in sponge construction Alahmad, Mohammad A. Alshaikhli, Imad Fakhri Taha Nandi, Mridul QA75 Electronic computers. Computer science Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function is built using two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes used in modern cryptographic hash function today. In this paper, we present multicollisions attack in sponge construction. Joux et al. [3] presented multicollision attack in iterated hash function. Our attack is similar to Joux attack but specifically for sponge construction. We showed that multicollisions in sponge construction of messages when the capacity c=n* yields to the same hash digest. Then, we use multicollision attack as a tool to prove that concatenating more than one hash function in order to increase the security level does not yield to more secure hash function. 2013 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/34357/1/icicm13-paper.pdf Alahmad, Mohammad A. and Alshaikhli, Imad Fakhri Taha and Nandi, Mridul (2013) Multicollisions in sponge construction. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, 4-6 September 2013, Kuala Lumpur, Malaysia. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6702812&queryText%3DMulticollisions+in+Sponge+construction doi:10.1109/ICICM.2013.44 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Alahmad, Mohammad A. Alshaikhli, Imad Fakhri Taha Nandi, Mridul Multicollisions in sponge construction |
description |
Cryptographic hash functions take an unfixed size of
input and produce a fixed size of an output. A hash function is
built using two main components: a compression function and
mode of operation. Sponge construction is one of the main
operations of modes used in modern cryptographic hash function
today. In this paper, we present multicollisions attack in sponge
construction. Joux et al. [3] presented multicollision attack in
iterated hash function. Our attack is similar to Joux attack but
specifically for sponge construction. We showed that
multicollisions in sponge construction of messages when the
capacity c=n* yields to the same hash digest. Then, we use
multicollision attack as a tool to prove that concatenating more
than one hash function in order to increase the security level
does not yield to more secure hash function. |
format |
Conference or Workshop Item |
author |
Alahmad, Mohammad A. Alshaikhli, Imad Fakhri Taha Nandi, Mridul |
author_facet |
Alahmad, Mohammad A. Alshaikhli, Imad Fakhri Taha Nandi, Mridul |
author_sort |
Alahmad, Mohammad A. |
title |
Multicollisions in sponge construction |
title_short |
Multicollisions in sponge construction |
title_full |
Multicollisions in sponge construction |
title_fullStr |
Multicollisions in sponge construction |
title_full_unstemmed |
Multicollisions in sponge construction |
title_sort |
multicollisions in sponge construction |
publishDate |
2013 |
url |
http://irep.iium.edu.my/34357/ http://irep.iium.edu.my/34357/ http://irep.iium.edu.my/34357/ http://irep.iium.edu.my/34357/1/icicm13-paper.pdf |
first_indexed |
2023-09-18T20:49:32Z |
last_indexed |
2023-09-18T20:49:32Z |
_version_ |
1777409901066190848 |