Multicollisions in sponge construction

Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function is built using two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes used in modern cryptographic hash functio...

Full description

Bibliographic Details
Main Authors: Alahmad, Mohammad A., Alshaikhli, Imad Fakhri Taha, Nandi, Mridul
Format: Proceeding Paper
Language:English
Published: 2013
Subjects:
Online Access:http://irep.iium.edu.my/34357/
http://irep.iium.edu.my/34357/1/icicm13-paper.pdf
_version_ 1848780897840529408
author Alahmad, Mohammad A.
Alshaikhli, Imad Fakhri Taha
Nandi, Mridul
author_facet Alahmad, Mohammad A.
Alshaikhli, Imad Fakhri Taha
Nandi, Mridul
author_sort Alahmad, Mohammad A.
building IIUM Repository
collection Online Access
description Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function is built using two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes used in modern cryptographic hash function today. In this paper, we present multicollisions attack in sponge construction. Joux et al. [3] presented multicollision attack in iterated hash function. Our attack is similar to Joux attack but specifically for sponge construction. We showed that multicollisions in sponge construction of messages when the capacity c=n* yields to the same hash digest. Then, we use multicollision attack as a tool to prove that concatenating more than one hash function in order to increase the security level does not yield to more secure hash function.
first_indexed 2025-11-14T15:40:58Z
format Proceeding Paper
id iium-34357
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T15:40:58Z
publishDate 2013
recordtype eprints
repository_type Digital Repository
spelling iium-343572014-01-16T08:17:31Z http://irep.iium.edu.my/34357/ Multicollisions in sponge construction Alahmad, Mohammad A. Alshaikhli, Imad Fakhri Taha Nandi, Mridul QA75 Electronic computers. Computer science Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function is built using two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes used in modern cryptographic hash function today. In this paper, we present multicollisions attack in sponge construction. Joux et al. [3] presented multicollision attack in iterated hash function. Our attack is similar to Joux attack but specifically for sponge construction. We showed that multicollisions in sponge construction of messages when the capacity c=n* yields to the same hash digest. Then, we use multicollision attack as a tool to prove that concatenating more than one hash function in order to increase the security level does not yield to more secure hash function. 2013 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/34357/1/icicm13-paper.pdf Alahmad, Mohammad A. and Alshaikhli, Imad Fakhri Taha and Nandi, Mridul (2013) Multicollisions in sponge construction. In: International Conference on Informatics and Creative Multimedia (ICICM), 2013, 4-6 September 2013, Kuala Lumpur, Malaysia. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6702812&queryText%3DMulticollisions+in+Sponge+construction doi:10.1109/ICICM.2013.44
spellingShingle QA75 Electronic computers. Computer science
Alahmad, Mohammad A.
Alshaikhli, Imad Fakhri Taha
Nandi, Mridul
Multicollisions in sponge construction
title Multicollisions in sponge construction
title_full Multicollisions in sponge construction
title_fullStr Multicollisions in sponge construction
title_full_unstemmed Multicollisions in sponge construction
title_short Multicollisions in sponge construction
title_sort multicollisions in sponge construction
topic QA75 Electronic computers. Computer science
url http://irep.iium.edu.my/34357/
http://irep.iium.edu.my/34357/
http://irep.iium.edu.my/34357/
http://irep.iium.edu.my/34357/1/icicm13-paper.pdf