Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.2.315

A Preimage Attack on the MJH Hash Function  

Lee, Jooyoung (Dept. of Mathematics - Applied Statistics, Sejong University)
Kim, Jongsung (Dept. of Mathematics, Kookmin University)
Abstract
In this paper, we present a new preimage attack on MJH, a double-block-length block cipher-based hash function. Currently, the best attack requires $O(2^{3n/2})$ queries for the 2n-bit MJH hash function based on an n-bit block cipher, while our attack requires $O(n2^n)$ queries and the same amount of memory, significantly improving the query complexity compared to the existing attack.
Keywords
Hash function; Preimage attack; Block ciphers;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Bona, "A Walk Through Combinatorics: An Introduction to Enumeration and Graph Theory," 3rd Edition, pp. 134-136, May 2006.
2 D. Hong and D. Kwon, "Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E97-A, No. 8, pp. 1747-1753, August 2014.   DOI
3 L. R. Knudsen, F. Mendel, C. Rechberger and S. S. Thomsen, "Cryptanalysis of MDC-2," Eurocrypt 2009, LNCS 5479, pp. 106-120, April 2009.
4 J. Lee and M. Stam, "MJH: a faster alternative to MDC-2," Designs, Codes and Cryptography, Vol. 76. Issue 2. pp. 179-205, August 2015.   DOI