Abstract
In this paper we present an improvement of the differential attack on hash functions based on block ciphers. By using the specific properties of the collision attack on hash functions, we can greatly reduce the work factor to find a pair that follows the characteristic. We propose a new family of differential characteristics that is especially useful in combination with our improvement. Attacks on a hash function based on DES variants reduced to 12, 13 or 15 rounds become faster than brute force collision attacks.
N.F.W.O. research assistant, sponsored by the National Fund for Scientific Research (Belgium)
N.F.W.O. postdoctoral researcher, sponsored by the National Fund for Scientific Research (Belgium)
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
E. Biham and A. Shamir, “Differential Cryptanalysis of the Data Encryption Standard,” Springer-Verlag, 1993.
FIPS 46, “Data Encryption Standard,” National Bureau of Standards, 1977.
L.R. Knudsen, “Iterative characteristics of DES and s2-DES,” Advances in Cryptology, Proc. Crypto'92, LNCS 740, E.F. Brickell, Ed., Springer-Verlag, 1993, pp. 497–511.
L.R. Knudsen, “Block Ciphers — Analysis, Design and Applications,” PhD Thesis, Aarhus University, Denmark, DAIMI PB-485, 1994.
X. Lai, J.L. Massey, and S. Murphy, “Markov ciphers and differential cryptanalysis,” Advances in Cryptology, Proc. Eurocrypt'91, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1991, pp. 17–38.
M. Matsui, “On correlation between the order of S-boxes and the strength of DES,” Advances in Cryptology, Proc. Eurocrypt'94, LNCS, A. De Santis, Ed., Springer-Verlag, to appear.
S. M. Matyas, C. H. Meyer, and J. Oseas, “Generating strong one-way functions with cryptographic algorithm,” IBM Techn. Disclosure Bull., Vol. 27, No. 10A, 1985, pp. 5658–5659.
B. Preneel, R. Govaerts, and J. Vandewalle, “Hash functions based on block ciphers: a synthetic approach,” Advances in Cryptology, Proc. Crypto'93, LNCS 773, D. Stinson, Ed., Springer-Verlag, 1994, pp. 368–378.
B. Preneel, “Differential cryptanalysis of hash functions based on block ciphers,” Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993, pp. 183–188.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rijmen, V., Preneel, B. (1995). Improved characteristics for differential cryptanalysis of hash functions based on block ciphers. In: Preneel, B. (eds) Fast Software Encryption. FSE 1994. Lecture Notes in Computer Science, vol 1008. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60590-8_18
Download citation
DOI: https://doi.org/10.1007/3-540-60590-8_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60590-4
Online ISBN: 978-3-540-47809-6
eBook Packages: Springer Book Archive