Question: Consider the following proposal for a cryptographic hash function, that makes use of a block cipher E with block size k bits to produce k

 Consider the following proposal for a cryptographic hash function, that makes

Consider the following proposal for a cryptographic hash function, that makes use of a block cipher E with block size k bits to produce k bit hash values. The message to be hashed is split into sequence M, M2.... M of k bit blocks. For simplicity, we ignore padding and consider only messages whose length is a multiple of the block size. Hashing works as follows: H= IV, hi = Em., for i = 1,2,...n. The hash of the message is h . Here IV is a fixed, public initialization vector, which is part of the definition of the hash function. The purpose of this problem is to show that this is not a very good scheme. Given hash value h and any message M, one can design a meet-in-the-middle attack that extends M with two blocks to produce a message that as has a hash value. The expected running time of the attack is in the order of 2k/2 encryptions and decryptions of a single block. Describe such an attack in detail, including motivations for time and apace requirements

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!