Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function


Share/Save/Bookmark

Liu, Bozhong and Gong, Zheng and Chen, Xiaohong and Qiu, Weidong and Zheng, Dong (2010) Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function. In: Internet Technology and Applications, 2010 International Conference on. IEEE, pp. 1-5. ISBN 9781424451425

[img]
Preview
PDF
240Kb
Abstract:Hash functions are widely used in authentication. In this paper, the security of Lin et al.'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al.'s expandable message techniques, we find the scheme is vulnerable to collision, preimage and second preimage attacks. Some modifications are recommended to avoid those security flaws in Lin et al.'s hash construction
Item Type:Book Section
Copyright:© IEEE
Faculty:
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/73963
Official URL:http://dx.doi.org/10.1109/ITAPP.2010.5566639
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page