In this paper, we give a new insight to the generic complexity of a near-collision attack. First, we consider time-memory trade-offs for truncation-based algorithms. For a practical implementation, it seems reasonable to assume that some memory is available and we show that taking advantage of this memory can significantly reduce the complexity. Second, we show a new method combining truncation and covering codes. The new algorithm is always at least as good as the previous works, and often gives a significant improvement. We illustrate our results by giving a 10-near collision for MD5: our algorithm has a complexity of 2^45.4 using 1TB of memory while the best previous
Category / Keywords: secret-key cryptography / Hash function, near-collision, generic attack, time-memory trade-off Date: received 31 Dec 2012 Contact author: gaetan leurent at normalesup org Available formats: PDF | BibTeX Citation Version: 20130101:143145 (All versions of this report) Discussion forum: Show discussion | Start new discussion