
For FullText PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.

Collision Resistance of DoubleBlockLength Hash Function against FreeStart Attack
Shoichi HIROSE
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E91A
No.1
pp.7482 Publication Date: 2008/01/01
Online ISSN: 17451337
DOI: 10.1093/ietfec/e91a.1.74
Print ISSN: 09168508 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Hash Functions Keyword: doubleblocklength hash function, random oracle model, ideal cipher model, collision resistance, freestart collision attack,
Full Text: PDF(186.5KB)>>
Summary:
In this article, we discuss the security of doubleblocklength (DBL) hash functions against the freestart collision attack. We focus on the DBL hash functions composed of compression functions of the form F(x) = (f(x), f(p(x))), where f is a smaller compression function and p is a permutation. We first show, in the random oracle model, that a significantly good upper bound can be obtained on the success probability of the freestart collision attack with sufficient conditions on p and the set of initial values. We also show that a similar upper bound can be obtained in the ideal cipher model if f is composed of a block cipher.

