Startseite Mathematik Cryptanalysis of a hash function, and the modular subset sum problem
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Cryptanalysis of a hash function, and the modular subset sum problem

  • Chris Monico EMAIL logo
Veröffentlicht/Copyright: 17. April 2019
Veröffentlichen auch Sie bei De Gruyter Brill

Abstract

Recently, Shpilrain and Sosnovski proposed a hash function based on composition of affine maps. In this paper, we show that this hash function with its proposed parameters is not weak collision resistant, for plaintexts of size at least 1.9MB (about 224 bits). Our approach is to reduce the preimage problem to a (very) high density instance of the Random Modular Subset Sum Problem, for which we give an algorithm capable of solving instances of the resulting size. Specifically, given plaintexts of about 1.9MB, we were able to produce other plaintexts of the same size with the same hash value in about 13 hours each, on average.

MSC 2010: 94A60; 68R05

Acknowledgements

We are grateful to the anonymous referees for their careful reading and feedback on the first draft of this paper.

References

[1] M. Grassl, I. Ilić, S. Magliveras and R. Steinwandt, Cryptanalysis of the Tillich–Zémor hash function, J. Cryptology 24 (2011), no. 1, 148–156. 10.1007/s00145-010-9063-0Suche in Google Scholar

[2] V. Lyubashevsky, On random high density subset sums, Electronic Colloquium on Computational Complexity Report no. 7, 2005. Suche in Google Scholar

[3] A. J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press Ser. Discrete Math. Appl., CRC Press, Boca Raton, 1997. Suche in Google Scholar

[4] V. Shpilrain and B. Sosnovski, Compositions of linear functions and applications to hashing, Groups Complex. Cryptol. 8 (2016), no. 2, 155–161. 10.1515/gcc-2016-0016Suche in Google Scholar

[5] J.-P. Tillich and G. Zémor, Hashing with SL2, Advances in Cryptology—CRYPTO ’94 (Santa Barbara 1994), Lecture Notes in Comput. Sci. 839, Springer, Berlin (1994), 40–49. 10.1007/3-540-48658-5_5Suche in Google Scholar

[6] National Institute of Standards and Technology, FIPS PUB 180-4: Secure Hash Standard (SHS), August 2015; http://dx.doi.org/10.6028/NIST.FIPS.180-4. 10.6028/NIST.FIPS.180-4Suche in Google Scholar

Received: 2018-01-17
Published Online: 2019-04-17
Published in Print: 2019-05-01

© 2019 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 22.12.2025 von https://www.degruyterbrill.com/document/doi/10.1515/gcc-2019-2001/html
Button zum nach oben scrollen