Please use this identifier to cite or link to this item:
Title: Functional graphs and their applications in generic attacks on iterated hash constructions
Authors: Bao, Zhenzhen
Wang, Lei
Guo, Jian
Keywords: Hash-Based MAC
Functional Graph
Issue Date: 2018
Source: Bao, Z., Guo, J., & Wang, L. (2018). Functional graphs and their applications in generic attacks on iterated hash constructions. IACR Transactions on Symmetric Cryptology, 2018(1), 201-253. doi:10.13154/tosc.v2018.i1.201-253
Series/Report no.: IACR Transactions on Symmetric Cryptology
Abstract: We provide a survey about generic attacks on cryptographic hash constructions including hash-based message authentication codes and hash combiners. We look into attacks involving iteratively evaluating identical mappings many times. The functional graph of a random mapping also involves iteratively evaluating the mapping. These attacks essentially exploit properties of the functional graph. We map the utilization space of those properties from numerous proposed known attacks, draw a comparison among classes of attacks about their advantages and limitations. We provide a systematic exposition of concepts of cycles, deep-iterate images, collisions and their roles in cryptanalysis of iterated hash constructions. We identify the inherent relationship between these concepts, such that case-by-case theories about them can be unified into one knowledge system, that is, theories on the functional graph of random mappings. We show that the properties of the cycle search algorithm, the chain evaluation algorithm and the collision search algorithm can be described based on statistic results on the functional graph. Thereby, we can provide different viewpoints to support previous beliefs on individual knowledge. In that, we invite more sophisticated analysis of the functional graph of random mappings and more future exploitations of its properties in cryptanalysis.
DOI: 10.13154/tosc.v2018.i1.201-253
Rights: © 2018 The Author(s). All rights reserved. This paper was published by Ruhr University Bochum in IACR Transactions on Symmetric Cryptology and is made available with permission of The Author(s).
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SPMS Journal Articles

Citations 5

Updated on Aug 31, 2020


Updated on Nov 22, 2020

Page view(s)

Updated on Nov 28, 2020


Updated on Nov 28, 2020

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.