Back to Search Start Over

A Second Preimage Attack on the XOR Hash Combiner

Authors :
Shiwei Chen
Ting Cui
Chenhui Jin
Congjun Wang
Source :
IET Information Security, Vol 2024 (2024)
Publication Year :
2024
Publisher :
Wiley, 2024.

Abstract

The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1. In this work, we analyze the second preimage resistance of the XOR combiner underlying two different narrow-pipe hash functions with weak ideal compression functions. To control simultaneously the behavior of the two different hash functions, we develop a new structure called multicollision-and-double-diamond. Multicollision-and-double-diamond structure is constructed using the idea of meet-in-the-middle technique, combined with Joux’s multicollision and Chen’s inverse-diamond structure. Then based on the multicollision-and-double-diamond structure, we present a second preimage attack on the XOR hash combiner with the time complexity of about O2n+12n/2+n−l2n−l+n−k2n−k+2l+1+2k+1) (n is the size of the XOR hash combiner and l and k are respectively the depths of the two inverse-diamond structures), less than the ideal time complexity O2n, and memory of about O2k+2l.

Details

Language :
English
ISSN :
17518717
Volume :
2024
Database :
Directory of Open Access Journals
Journal :
IET Information Security
Publication Type :
Academic Journal
Accession number :
edsdoj.76ce1389d8214120b5e9a30224deec27
Document Type :
article
Full Text :
https://doi.org/10.1049/2024/1230891