• DocumentCode
    668302
  • Title

    Multicollisions in Sponge Construction

  • Author

    Alahmad, M.A. ; Alshaikhli, Imad Fakhri ; Nandi, Mridul

  • Author_Institution
    Dept. of Comput. Sci., Int. Islamic Univ. of Malaysia, Kuala Lumpur, Malaysia
  • fYear
    2013
  • fDate
    4-6 Sept. 2013
  • Firstpage
    215
  • Lastpage
    219
  • Abstract
    Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function is built using two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes used in modern cryptographic hash function today. In this paper, we present multicollisions attack in sponge construction. Joux et al. [3] presented multicollision attack in iterated hash function. Our attack is similar to Joux attack but specifically for sponge construction. We showed that multicollisions in sponge construction of messages when the capacity c=n yields to the same hash digest. Then, we use multicollision attack as a tool to prove that concatenating more than one hash function in order to increase the security level does not yield to more secure hash function.
  • Keywords
    cryptography; data compression; Joux attack; compression function; cryptographic hash function; fixed sized output; hash digest; hash function concatenation; iterated hash function; multicollision attack; operation mode; security level; sponge construction; unfixed sized input; Complexity theory; Computer science; Conferences; Cryptography; Educational institutions; Resistance; Concatenation; Multicollisions; Sponge;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Informatics and Creative Multimedia (ICICM), 2013 International Conference on
  • Conference_Location
    Kuala Lumpur
  • Type

    conf

  • DOI
    10.1109/ICICM.2013.44
  • Filename
    6702812