Paper 2015/973
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash
Ashwin Jha and Mridul Nandi
Abstract
At SAC 2006, Liskov proposed the zipper hash, a technique for constructing secure (indifferentiable from random oracles) hash functions based on weak (invertible) compression functions. Zipper hash is a two pass scheme, which makes it unfit for practical consideration. But, from the theoretical point of view it seemed to be secure, as it had resisted standard attacks for long. Recently, Andreeva {\em et al.} gave a forced-suffix herding attack on the zipper hash, and Chen and Jin showed a second preimage attack provided
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- hash functionzipper hashconcatenated hashtimememory trade-off(second) preimageherding attack
- Contact author(s)
- ashwin jha1991 @ gmail com
- History
- 2015-10-09: received
- Short URL
- https://ia.cr/2015/973
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/973, author = {Ashwin Jha and Mridul Nandi}, title = {Some Cryptanalytic Results on Zipper Hash and Concatenated Hash}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/973}, year = {2015}, url = {https://eprint.iacr.org/2015/973} }