Title
Attacking the Knudsen-Preneel compression functions
Abstract
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear error-correcting code is used to build a wide-pipe compression function from underlying blockciphers operating in Davies-Meyer mode. In this paper, we (re)analyse the preimage resistance of the Knudsen-Preneel compression functions in the setting of public random functions. We give a new non-adaptive preimage attack, beating the one given by Knudsen and Preneel, that is optimal in terms of query complexity. Moreover, our new attack falsifies their (conjectured) preimage resistance security bound and shows that intuitive bounds based on the number of 'active' components can be treacherous. Complementing our attack is a formal analysis of the query complexity (both lower and upper bounds) of preimage-finding attacks. This analysis shows that for many concrete codes the time complexity of our attack is optimal.
Year
DOI
Venue
2010
10.1007/978-3-642-13858-4_6
FSE
Keywords
DocType
Volume
preimage-finding attack,hash function design,query complexity,new attack,new non-adaptive preimage attack,preimage resistance security,preimage resistance,formal analysis,knudsen-preneel compression function,time complexity
Conference
6147
ISSN
ISBN
Citations 
0302-9743
3-642-13857-8
3
PageRank 
References 
Authors
0.36
20
3
Name
Order
Citations
PageRank
Onur Özen12368.61
Thomas Shrimpton2132060.19
Martijn Stam3165967.36