IIUM Repository

Multicollisions in sponge construction

Alahmad, Mohammad A. and Alshaikhli, Imad Fakhri Taha and Nandi, Mridul (2013) Multicollisions in sponge construction. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, 4-6 September 2013, Kuala Lumpur, Malaysia.

[img] PDF (Multicollisions in Sponge Construction) - Published Version
Restricted to Repository staff only

Download (447kB) | Request a copy


Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function is built using two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes used in modern cryptographic hash function today. In this paper, we present multicollisions attack in sponge construction. Joux et al. [3] presented multicollision attack in iterated hash function. Our attack is similar to Joux attack but specifically for sponge construction. We showed that multicollisions in sponge construction of messages when the capacity c=n* yields to the same hash digest. Then, we use multicollision attack as a tool to prove that concatenating more than one hash function in order to increase the security level does not yield to more secure hash function.

Item Type: Conference or Workshop Item (Full Paper)
Additional Information: 6534/34357 (ISBN 978-0-7695-5133-3)
Uncontrolled Keywords: Sponge; Concatenation
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Professor Imad Taha
Date Deposited: 16 Jan 2014 16:17
Last Modified: 16 Jan 2014 16:17
URI: http://irep.iium.edu.my/id/eprint/34357

Actions (login required)

View Item View Item


Downloads per month over past year