A Second Preimage Attack on the XOR Hash Combiner

The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1. In this work, we analyze the second preimage resistance of the XOR combiner underlying two different narrow-pipe hash f...

Full description

Saved in:
Bibliographic Details
Main Authors: Shiwei Chen, Ting Cui, Chenhui Jin, Congjun Wang
Format: Article
Language:English
Published: Wiley 2024-01-01
Series:IET Information Security
Online Access:http://dx.doi.org/10.1049/2024/1230891
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832559631584460800
author Shiwei Chen
Ting Cui
Chenhui Jin
Congjun Wang
author_facet Shiwei Chen
Ting Cui
Chenhui Jin
Congjun Wang
author_sort Shiwei Chen
collection DOAJ
description The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1. In this work, we analyze the second preimage resistance of the XOR combiner underlying two different narrow-pipe hash functions with weak ideal compression functions. To control simultaneously the behavior of the two different hash functions, we develop a new structure called multicollision-and-double-diamond. Multicollision-and-double-diamond structure is constructed using the idea of meet-in-the-middle technique, combined with Joux’s multicollision and Chen’s inverse-diamond structure. Then based on the multicollision-and-double-diamond structure, we present a second preimage attack on the XOR hash combiner with the time complexity of about O2n+12n/2+n−l2n−l+n−k2n−k+2l+1+2k+1) (n is the size of the XOR hash combiner and l and k are respectively the depths of the two inverse-diamond structures), less than the ideal time complexity O2n, and memory of about O2k+2l.
format Article
id doaj-art-76ce1389d8214120b5e9a30224deec27
institution Kabale University
issn 1751-8717
language English
publishDate 2024-01-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-76ce1389d8214120b5e9a30224deec272025-02-03T01:29:35ZengWileyIET Information Security1751-87172024-01-01202410.1049/2024/1230891A Second Preimage Attack on the XOR Hash CombinerShiwei Chen0Ting Cui1Chenhui Jin2Congjun Wang3The Department of Applied MathematicsThe Department of Applied MathematicsThe Department of Applied MathematicsThe Department of Applied MathematicsThe exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1. In this work, we analyze the second preimage resistance of the XOR combiner underlying two different narrow-pipe hash functions with weak ideal compression functions. To control simultaneously the behavior of the two different hash functions, we develop a new structure called multicollision-and-double-diamond. Multicollision-and-double-diamond structure is constructed using the idea of meet-in-the-middle technique, combined with Joux’s multicollision and Chen’s inverse-diamond structure. Then based on the multicollision-and-double-diamond structure, we present a second preimage attack on the XOR hash combiner with the time complexity of about O2n+12n/2+n−l2n−l+n−k2n−k+2l+1+2k+1) (n is the size of the XOR hash combiner and l and k are respectively the depths of the two inverse-diamond structures), less than the ideal time complexity O2n, and memory of about O2k+2l.http://dx.doi.org/10.1049/2024/1230891
spellingShingle Shiwei Chen
Ting Cui
Chenhui Jin
Congjun Wang
A Second Preimage Attack on the XOR Hash Combiner
IET Information Security
title A Second Preimage Attack on the XOR Hash Combiner
title_full A Second Preimage Attack on the XOR Hash Combiner
title_fullStr A Second Preimage Attack on the XOR Hash Combiner
title_full_unstemmed A Second Preimage Attack on the XOR Hash Combiner
title_short A Second Preimage Attack on the XOR Hash Combiner
title_sort second preimage attack on the xor hash combiner
url http://dx.doi.org/10.1049/2024/1230891
work_keys_str_mv AT shiweichen asecondpreimageattackonthexorhashcombiner
AT tingcui asecondpreimageattackonthexorhashcombiner
AT chenhuijin asecondpreimageattackonthexorhashcombiner
AT congjunwang asecondpreimageattackonthexorhashcombiner
AT shiweichen secondpreimageattackonthexorhashcombiner
AT tingcui secondpreimageattackonthexorhashcombiner
AT chenhuijin secondpreimageattackonthexorhashcombiner
AT congjunwang secondpreimageattackonthexorhashcombiner