• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ma Bingke, Li Bao. Collision and Second Preimage Attacks on the HTBC Hash Function[J]. Journal of Computer Research and Development, 2014, 51(11): 2513-2517. DOI: 10.7544/issn1000-1239.2014.20130882
Citation: Ma Bingke, Li Bao. Collision and Second Preimage Attacks on the HTBC Hash Function[J]. Journal of Computer Research and Development, 2014, 51(11): 2513-2517. DOI: 10.7544/issn1000-1239.2014.20130882

Collision and Second Preimage Attacks on the HTBC Hash Function

More Information
  • Published Date: October 31, 2014
  • A common way to build hash functions is combining a secure block cipher with an appropriate chaining structure. When the block cipher used has strong security properties such as AES, the security of this kind of hash functions mainly depends on the security of the certain chaining structure. HTBC is a hash function design which uses a special triple-block-chaining structure to be combined with a secure block cipher. The triple-block-chaining structure used by the HTBC hash function is not secure. Based on the serious flaws of the chaining structure, using particular properties of related operations, the collisions of the HTBC hash function can be directly constructed, and the time complexity to find a single collision is only 1. For the messages with certain length, a second preimage can be constructed as well. When AES-256 is used as the block cipher, the maximum time complexity to launch a second preimage attack is 2\+{112}, which is lower than the brute force attack bound 2\+{128}. For the particular weak messages, the overall time needed to find a second preimage is only 1. If the message is randomly chosen, the average time complexity to launch a successful second preimage attack is 2\+{46.56}.
  • Related Articles

    [1]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [2]Yao Yingbiao, Shen Zuobing. An Improved DFTL Algorithm Based on Sequential Cache and Second Level Cache[J]. Journal of Computer Research and Development, 2014, 51(9): 2012-2021. DOI: 10.7544/issn1000-1239.2014.20130660
    [3]Wu Haifeng, Zeng Yu, and Feng Jihua. Passive RFID Tag Anti-Collision Binary Tree Slotted Protocol without Tags Quantity Estimation[J]. Journal of Computer Research and Development, 2012, 49(9): 1959-1971.
    [4]Xie Liping and Zeng Jianchao. Physicomimetics Method for Global Optimization[J]. Journal of Computer Research and Development, 2011, 48(5): 848-854.
    [5]Wu Haifeng and Zeng Yu. ADFA Protocol for RFID Tag Collision Arbitration[J]. Journal of Computer Research and Development, 2011, 48(5): 802-810.
    [6]Zhou Huan, Xu Shouzhi, and Li Chengxia. A V2V Broadcast Protocol for Chain Collision Avoidance on Highways[J]. Journal of Computer Research and Development, 2009, 46(12): 2062-2067.
    [7]Liu Li, Wang Zhaoqi, Xia Shihong, Li Chunpeng. Research on Directional Penetration Depth Algorithm in Collision Response[J]. Journal of Computer Research and Development, 2008, 45(3): 519-526.
    [8]Sun Guozhong, Yuan Qingbo, Chen Mingyu, Fan Jianping. An Improved Adaptive Buffer Replacement Algorithm Used for Second Level Buffer[J]. Journal of Computer Research and Development, 2007, 44(8): 1331-1338.
    [9]Su Xiaohong, Zhang Mingjie, Ma Peijun, and Wang Yadong. Research on Solving the Problem of CMAC Neural Network Collision[J]. Journal of Computer Research and Development, 2006, 43(5): 862-866.
    [10]Mao Tianlu, Wang Zhaoqi, Xia Shihong. An Algorithm for Collision Detection and Response Between Human Body Model and Cloth in 3D Garment Simulation[J]. Journal of Computer Research and Development, 2006, 43(2): 356-361.

Catalog

    Article views (1447) PDF downloads (663) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return