Second Preimages for Iterated Hash Functions and their Implications on MACs

Norbert Pramstaller, Mario Lamberger, Vincent Rijmen

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

In this article, we focus on second preimages for iterated hash functions. More precisely, we introduce the notion of a b-block bypass which is closely related to the notion of second preimage but specifies additional properties. We will then give two examples of iterated hash functions to which this notion applies: a double-block length hash function and a single-block length hash function. Furthermore, we look at NMAC and HMAC and show the implications of a b-block bypass regarding forgery attacks. As a result it turns out that the impact of second preimages for NMAC and HMAC heavily depends on how the second preimages are constructed.
Original languageEnglish
Title of host publicationInformation Security and Privacy. ACISP 2007
Subtitle of host publication12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings
Place of PublicationBerlin; Heidelberg
PublisherSpringer
Pages68-81
ISBN (Print)978-3-540-73457-4
DOIs
Publication statusPublished - 2007
Event12th Australasian Conference on Information Security and Privacy: ACISP 2007 - Townsville, Australia
Duration: 2 Jul 20074 Jul 2007

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume4586

Conference

Conference12th Australasian Conference on Information Security and Privacy
Abbreviated titleACISP 2007
Country/TerritoryAustralia
CityTownsville
Period2/07/074/07/07

Fingerprint

Dive into the research topics of 'Second Preimages for Iterated Hash Functions and their Implications on MACs'. Together they form a unique fingerprint.
  • Cryptography

    Schläffer, M. (Co-Investigator (CoI)), Oswald, M. E. (Co-Investigator (CoI)), Lipp, P. (Co-Investigator (CoI)), Dobraunig, C. E. (Co-Investigator (CoI)), Mendel, F. (Co-Investigator (CoI)), Eichlseder, M. (Co-Investigator (CoI)), Nad, T. (Co-Investigator (CoI)), Posch, R. (Co-Investigator (CoI)), Lamberger, M. (Co-Investigator (CoI)), Rijmen, V. (Co-Investigator (CoI)) & Rechberger, C. (Co-Investigator (CoI))

    1/01/9531/01/19

    Project: Research area

Cite this