Security Analysis of Zipper Hash Against Multicollisions Attacks

Journal Title: Engineering, Technology & Applied Science Research - Year 2012, Vol 2, Issue 3

Abstract

In this paper, the existence of multicollisions in Zipper Hash structure, a new Hash structure which was introduced to strengthen the iterated Hash structures, is presented. This study shows that finding multicollisions, i.e. 2k-way collision, in this Hash structure is not much harder than finding such multicollisions in ordinary Merkle - Damgard (MD) structure. In fact, the complexity of the attacks is approximately n/2 times harder than what has been found for MD structures. Then, these large multicollisions are used as a tool to find D-way preimage for this structure. The complexity of finding 2K-way multicollisions and 2k-way preimages are (eq) and (eq) respectively. Similar to what has been proved by Joux for MD, it is shown in this paper that this structure could not be used to create a Hash function with 2n-bit length by concatenating this structure with any other Hash structure by Hash’s output length of n-bite. It is also shown that time complexity of finding a collision for this concatenated structure is (eq) which is much smaller than what was expected from generic-birthday attack which would be (eq) . In addition, it is shown that increasing the number of rounds of this Hash function can not improve its security against this attack significantly and the attacker can find multicollisions on this Hash function which means that this Hash function has a structural flaw.

Authors and Affiliations

N. Bagheri

Keywords

Related Articles

Fuel Substitution for Energy Saving: A Case Study of Foundry Plant

Foundry based organizations consume significant amounts of energy for producing their final products. Recently, techno-commercial and environmental factors have started triggering change from fossil fuels to cleaner ones...

A Survey and Analysis of the Relationship between Human Resources Management and Organizational Performance

This study aims to evaluate the relationship between human resources management and organizational performance with emphasis on the mediating role of organizational innovation. The study methodology is descriptive-correl...

Investigation of Leakage Current Waveforms Recorded in a Coastal High Voltage Substation

Leakage current monitoring is a widely employed technique to monitor the performance of outdoor insulation. The evaluation of leakage current waveforms recorded in the field, offers significant information since insulati...

SHAF for Mitigation of Current Harmonics Using p-q Method with PI and Fuzzy Controllers

Commencing with incandescent light bulb, every load today creates harmonics. Unfortunately, these loads vary with respect to their amount of harmonic content and response to problems caused by harmonics. Issue of Harmoni...

Maximum Power Tracking System Based on Power Electronic Topology for Wind Energy Conversion System Applications

Wind energy has emerged as a dominant alternative power generation source. Conventional energy resources are depleting and their increasing cost cannot be ignored. Wind energy has taken an important role in replacing fos...

Download PDF file
  • EP ID EP88683
  • DOI -
  • Views 300
  • Downloads 0

How To Cite

N. Bagheri (2012). Security Analysis of Zipper Hash Against Multicollisions Attacks. Engineering, Technology & Applied Science Research, 2(3), -. https://europub.co.uk/articles/-A-88683