Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2009

AUTHORS

Jean-Philippe Aumasson , Willi Meier , Florian Mendel

ABSTRACT

This paper presents preimage attacks on the hash functions 3-pass HAVAL and step-reduced MD5. Introduced in 1992 and 1991 respectively, these functions underwent severe collision attacks, but no preimage attack. We describe two preimage attacks on the compression function of 3-pass HAVAL. The attacks have a complexity of about 2224 compression function evaluations instead of 2256. We present several preimage attacks on the MD5 compression function that invert up to 47 steps (out of 64) within 296 trials instead of 2128. Although our attacks are not practical, they show that the security margin of 3-pass HAVAL and step-reduced MD5 with respect to preimage attacks is not as high as expected. More... »

PAGES

120-135

Book

TITLE

Selected Areas in Cryptography

ISBN

978-3-642-04158-7
978-3-642-04159-4

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-04159-4_8

DOI

http://dx.doi.org/10.1007/978-3-642-04159-4_8

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1025834615


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IAIK, Graz University of Technology, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "IAIK, Graz University of Technology, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Mendel", 
        "givenName": "Florian", 
        "id": "sg:person.013342563571.85", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013342563571.85"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2009", 
    "datePublishedReg": "2009-01-01", 
    "description": "This paper presents preimage attacks on the hash functions 3-pass HAVAL and step-reduced MD5. Introduced in 1992 and 1991 respectively, these functions underwent severe collision attacks, but no preimage attack. We describe two preimage attacks on the compression function of 3-pass HAVAL. The attacks have a complexity of about 2224 compression function evaluations instead of 2256. We present several preimage attacks on the MD5 compression function that invert up to 47 steps (out of 64) within 296 trials instead of 2128. Although our attacks are not practical, they show that the security margin of 3-pass HAVAL and step-reduced MD5 with respect to preimage attacks is not as high as expected.", 
    "editor": [
      {
        "familyName": "Avanzi", 
        "givenName": "Roberto Maria", 
        "type": "Person"
      }, 
      {
        "familyName": "Keliher", 
        "givenName": "Liam", 
        "type": "Person"
      }, 
      {
        "familyName": "Sica", 
        "givenName": "Francesco", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-04159-4_8", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-04158-7", 
        "978-3-642-04159-4"
      ], 
      "name": "Selected Areas in Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "MD5 compression function", 
      "trials", 
      "compression function evaluations", 
      "function", 
      "evaluation", 
      "attacks", 
      "margin", 
      "function evaluations", 
      "preimage attack", 
      "step", 
      "respect", 
      "MD5", 
      "HAVAL", 
      "complexity", 
      "compression function", 
      "security margin", 
      "collision attack", 
      "paper", 
      "hash functions 3-pass HAVAL", 
      "functions 3-pass HAVAL", 
      "step-reduced MD5", 
      "severe collision attacks"
    ], 
    "name": "Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5", 
    "pagination": "120-135", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1025834615"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-04159-4_8"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-04159-4_8", 
      "https://app.dimensions.ai/details/publication/pub.1025834615"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:26", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_454.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-04159-4_8"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04159-4_8'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04159-4_8'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04159-4_8'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-04159-4_8'


 

This table displays all metadata directly associated to this object as RDF triples.

109 TRIPLES      23 PREDICATES      48 URIs      41 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-04159-4_8 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N81984a18500040ea8fcd42c803926590
4 schema:datePublished 2009
5 schema:datePublishedReg 2009-01-01
6 schema:description This paper presents preimage attacks on the hash functions 3-pass HAVAL and step-reduced MD5. Introduced in 1992 and 1991 respectively, these functions underwent severe collision attacks, but no preimage attack. We describe two preimage attacks on the compression function of 3-pass HAVAL. The attacks have a complexity of about 2224 compression function evaluations instead of 2256. We present several preimage attacks on the MD5 compression function that invert up to 47 steps (out of 64) within 296 trials instead of 2128. Although our attacks are not practical, they show that the security margin of 3-pass HAVAL and step-reduced MD5 with respect to preimage attacks is not as high as expected.
7 schema:editor N5598cea0bc0d4979a7e9da1a4e5ddd98
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N3b03d8d282fe49b8aca1ace26830599e
12 schema:keywords HAVAL
13 MD5
14 MD5 compression function
15 attacks
16 collision attack
17 complexity
18 compression function
19 compression function evaluations
20 evaluation
21 function
22 function evaluations
23 functions 3-pass HAVAL
24 hash functions 3-pass HAVAL
25 margin
26 paper
27 preimage attack
28 respect
29 security margin
30 severe collision attacks
31 step
32 step-reduced MD5
33 trials
34 schema:name Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
35 schema:pagination 120-135
36 schema:productId N457e181a833148758cb6b9bc4fdf6c42
37 Nd89663f137fc4bba99c154c875fd60e9
38 schema:publisher Nec5e98419c2c4a2abc73967515595121
39 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025834615
40 https://doi.org/10.1007/978-3-642-04159-4_8
41 schema:sdDatePublished 2022-01-01T19:26
42 schema:sdLicense https://scigraph.springernature.com/explorer/license/
43 schema:sdPublisher N388f486da9164738becf1a20e22e4f47
44 schema:url https://doi.org/10.1007/978-3-642-04159-4_8
45 sgo:license sg:explorer/license/
46 sgo:sdDataset chapters
47 rdf:type schema:Chapter
48 N1cbeec1df3724f1bb3a291da7a19a128 rdf:first N25f141382ca4417497206667437786a7
49 rdf:rest rdf:nil
50 N1eea9dc68b43426db01799a33569e67e schema:familyName Avanzi
51 schema:givenName Roberto Maria
52 rdf:type schema:Person
53 N25f141382ca4417497206667437786a7 schema:familyName Sica
54 schema:givenName Francesco
55 rdf:type schema:Person
56 N388f486da9164738becf1a20e22e4f47 schema:name Springer Nature - SN SciGraph project
57 rdf:type schema:Organization
58 N3b03d8d282fe49b8aca1ace26830599e schema:isbn 978-3-642-04158-7
59 978-3-642-04159-4
60 schema:name Selected Areas in Cryptography
61 rdf:type schema:Book
62 N457e181a833148758cb6b9bc4fdf6c42 schema:name dimensions_id
63 schema:value pub.1025834615
64 rdf:type schema:PropertyValue
65 N5598cea0bc0d4979a7e9da1a4e5ddd98 rdf:first N1eea9dc68b43426db01799a33569e67e
66 rdf:rest Ndccf6ea26f5246f5accfb71f44659fda
67 N56980c6bb1f24623b5964786827bc869 rdf:first sg:person.013342563571.85
68 rdf:rest rdf:nil
69 N81984a18500040ea8fcd42c803926590 rdf:first sg:person.012606440341.66
70 rdf:rest N93d59d50a3284393ae35f9e62b9e7fe6
71 N8d8baa14a8c047ada06da3b0f9336a8a schema:familyName Keliher
72 schema:givenName Liam
73 rdf:type schema:Person
74 N93d59d50a3284393ae35f9e62b9e7fe6 rdf:first sg:person.07653531142.18
75 rdf:rest N56980c6bb1f24623b5964786827bc869
76 Nd89663f137fc4bba99c154c875fd60e9 schema:name doi
77 schema:value 10.1007/978-3-642-04159-4_8
78 rdf:type schema:PropertyValue
79 Ndccf6ea26f5246f5accfb71f44659fda rdf:first N8d8baa14a8c047ada06da3b0f9336a8a
80 rdf:rest N1cbeec1df3724f1bb3a291da7a19a128
81 Nec5e98419c2c4a2abc73967515595121 schema:name Springer Nature
82 rdf:type schema:Organisation
83 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
84 schema:name Information and Computing Sciences
85 rdf:type schema:DefinedTerm
86 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
87 schema:name Data Format
88 rdf:type schema:DefinedTerm
89 sg:person.012606440341.66 schema:affiliation grid-institutes:grid.410380.e
90 schema:familyName Aumasson
91 schema:givenName Jean-Philippe
92 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
93 rdf:type schema:Person
94 sg:person.013342563571.85 schema:affiliation grid-institutes:grid.410413.3
95 schema:familyName Mendel
96 schema:givenName Florian
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013342563571.85
98 rdf:type schema:Person
99 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
100 schema:familyName Meier
101 schema:givenName Willi
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
103 rdf:type schema:Person
104 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
105 schema:name FHNW, Windisch, Switzerland
106 rdf:type schema:Organization
107 grid-institutes:grid.410413.3 schema:alternateName IAIK, Graz University of Technology, Graz, Austria
108 schema:name IAIK, Graz University of Technology, Graz, Austria
109 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...