Back to Search Start Over

Algorithms for Solving the Unbalanced r-Collision Problem.

Authors :
ZOU Jian
LI Jin-Chun
DONG Le
LI Ling-Chen
Source :
Journal of Cryptologic Research (2095-7025); 2023, Vol. 10 Issue 3, p574-587, 14p
Publication Year :
2023

Abstract

At present, the problem of r-collision in the unbalanced environment has not yet been effectively solved. In this paper, a new efficient algorithm is proposed to find an unbalanced r-collision of r different and unbalanced functions. The new algorithm adopts the techniques from the previous 3-collision algorithm, the parallel collision search (PCS) algorithm and the unbalanced meet-in-themiddle (UMitM) attack. The attack process of the new algorithm can be described as follows: First, the attacker divides r functions into left and right sets. When r is even, the corresponding left and right sets are {f<subscript>l1</subscript>, f<subscript>l2</subscript>, ???, f<subscript>lr/2</subscript>} and {f<subscript>t1</subscript>, f<subscript>t2</subscript>, ???, f<subscript>tr/2</subscript>} respectively, and it is necessary to find collisions between two unbalanced functions f<subscript>li</subscript> and f<subscript>ti</subscript> (for 1 ≤ ⌊r/2⌋) at corresponding positions in the left and right sets. Take the i-th function for example, the attacker adopts the PCS algorithm to collect 2<superscript>mi</superscript> collisions of two unbalanced functions f<subscript>li</subscript> and f<subscript>ti</subscript>. Note that the attacker needs to repeat the collectioncollision operation for ⌊r/2⌋ pairs of positions in the left and right sets. If r is odd, the attacker also needs to collect 2<superscript>m0</superscript> images of the left function. After the collision-collection phase, the attacker adopts the MitM attack to find a r-collision between these r -- ⌊r/2⌋ lists. The main results of the new algorithm are: (1) The time complexity of the new algorithm is determined by the memory and the chosen grouping methods, which is different from the previous r-collision algorithm. (2) With sufficient storage, the time complexity formula of the new r-collision algorithm is as follows: when r = 2k, the time complexity is .... When r = 2k + 1, the time complexity is ..., where R<subscript>lj</subscript> is the implementation cost of the function with the highest implementation cost in the left set, Rc is the implementation cost of the unpaired function, and R<subscript>tx</subscript>(1 ≤ x ≤ (r -- 1)/2) is the implementation cost of each function in the right set. The attacker first needs to find min (&#931<subscript>x=1</subscript><superscript>r/2</superscript> log<subscript>2</subscript> R<subscript>tx/r</subscript> + log<subscript>2</subscript>r<subscript>lj</subscript>/2) for r = 2k (or min (log<subscript>2</subscript> R<subscript>c</subscript> + Σ<subscript>x=1</subscript><superscript>(r-1)/2</superscript> log <subscript>2</subscript> R<subscript>tx/r</subscript> + (r-1)log<subscript>2</subscript> R<subscript>ij</subscript>/2r) for r = 2k + 1) so as to find the best grouping method and the best time complexity in this case. (3) With limited storage, the attacker cannot find the best time complexity without exhausting the time complexity of all grouping methods. [ABSTRACT FROM AUTHOR]

Details

Language :
Chinese
ISSN :
20957025
Volume :
10
Issue :
3
Database :
Complementary Index
Journal :
Journal of Cryptologic Research (2095-7025)
Publication Type :
Academic Journal
Accession number :
172300697
Full Text :
https://doi.org/10.13868/j.cnki.jcr.000614