Combinatorial multicollision attacks on generalized iterated hash functions

Kimmo Halunen, Juha Kortelainen, Tuomas Kortelainen

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

3 Citations (Scopus)

Abstract

We develop a word combinatorial approach to multi-collisions in generalized iterated hash functions. The work rests on the notable discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stin-son as well as J. Hoch and A. Shamir. New results and improvements to some previously published ones are produced. We also wish to unify the diverse notations and bring the results together by applying concepts of combinatorics on words. A multicollision attack method informally described by Hoch and Shamir is presented as a statistical procedure and analyzed in detail.

Original languageEnglish
Title of host publicationProceedings of the 8th Australasian Information Security Conference, AISC 2010
Pages86-93
Number of pages8
Publication statusPublished - 2010
MoE publication typeNot Eligible
Event8th Australasian Information Security Conference, AISC 2010 - Brisbane, Australia
Duration: 19 Jan 201020 Jan 2010

Publication series

NameConferences in Research and Practice in Information Technology Series
Volume105
ISSN (Print)1445-1336

Conference

Conference8th Australasian Information Security Conference, AISC 2010
CountryAustralia
CityBrisbane
Period19/01/1020/01/10

Fingerprint

Hash functions

Keywords

  • Iterated hash functions
  • Multicollisions
  • Word combinatorics

Cite this

Halunen, K., Kortelainen, J., & Kortelainen, T. (2010). Combinatorial multicollision attacks on generalized iterated hash functions. In Proceedings of the 8th Australasian Information Security Conference, AISC 2010 (pp. 86-93). Conferences in Research and Practice in Information Technology Series, Vol.. 105
Halunen, Kimmo ; Kortelainen, Juha ; Kortelainen, Tuomas. / Combinatorial multicollision attacks on generalized iterated hash functions. Proceedings of the 8th Australasian Information Security Conference, AISC 2010. 2010. pp. 86-93 (Conferences in Research and Practice in Information Technology Series, Vol. 105).
@inproceedings{e3b943019c3c40bb860ad376ea7f1247,
title = "Combinatorial multicollision attacks on generalized iterated hash functions",
abstract = "We develop a word combinatorial approach to multi-collisions in generalized iterated hash functions. The work rests on the notable discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stin-son as well as J. Hoch and A. Shamir. New results and improvements to some previously published ones are produced. We also wish to unify the diverse notations and bring the results together by applying concepts of combinatorics on words. A multicollision attack method informally described by Hoch and Shamir is presented as a statistical procedure and analyzed in detail.",
keywords = "Iterated hash functions, Multicollisions, Word combinatorics",
author = "Kimmo Halunen and Juha Kortelainen and Tuomas Kortelainen",
year = "2010",
language = "English",
isbn = "978-192068286-6",
series = "Conferences in Research and Practice in Information Technology Series",
pages = "86--93",
booktitle = "Proceedings of the 8th Australasian Information Security Conference, AISC 2010",

}

Halunen, K, Kortelainen, J & Kortelainen, T 2010, Combinatorial multicollision attacks on generalized iterated hash functions. in Proceedings of the 8th Australasian Information Security Conference, AISC 2010. Conferences in Research and Practice in Information Technology Series, vol. 105, pp. 86-93, 8th Australasian Information Security Conference, AISC 2010, Brisbane, Australia, 19/01/10.

Combinatorial multicollision attacks on generalized iterated hash functions. / Halunen, Kimmo; Kortelainen, Juha; Kortelainen, Tuomas.

Proceedings of the 8th Australasian Information Security Conference, AISC 2010. 2010. p. 86-93 (Conferences in Research and Practice in Information Technology Series, Vol. 105).

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

TY - GEN

T1 - Combinatorial multicollision attacks on generalized iterated hash functions

AU - Halunen, Kimmo

AU - Kortelainen, Juha

AU - Kortelainen, Tuomas

PY - 2010

Y1 - 2010

N2 - We develop a word combinatorial approach to multi-collisions in generalized iterated hash functions. The work rests on the notable discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stin-son as well as J. Hoch and A. Shamir. New results and improvements to some previously published ones are produced. We also wish to unify the diverse notations and bring the results together by applying concepts of combinatorics on words. A multicollision attack method informally described by Hoch and Shamir is presented as a statistical procedure and analyzed in detail.

AB - We develop a word combinatorial approach to multi-collisions in generalized iterated hash functions. The work rests on the notable discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stin-son as well as J. Hoch and A. Shamir. New results and improvements to some previously published ones are produced. We also wish to unify the diverse notations and bring the results together by applying concepts of combinatorics on words. A multicollision attack method informally described by Hoch and Shamir is presented as a statistical procedure and analyzed in detail.

KW - Iterated hash functions

KW - Multicollisions

KW - Word combinatorics

UR - http://www.scopus.com/inward/record.url?scp=84865678342&partnerID=8YFLogxK

M3 - Conference article in proceedings

SN - 978-192068286-6

T3 - Conferences in Research and Practice in Information Technology Series

SP - 86

EP - 93

BT - Proceedings of the 8th Australasian Information Security Conference, AISC 2010

ER -

Halunen K, Kortelainen J, Kortelainen T. Combinatorial multicollision attacks on generalized iterated hash functions. In Proceedings of the 8th Australasian Information Security Conference, AISC 2010. 2010. p. 86-93. (Conferences in Research and Practice in Information Technology Series, Vol. 105).