Abstract
A critical analysis of the modified cryptographic checksum algorithm of Cohen and Huang points out some weaknesses in the scheme. We show how to exploit these weaknesses with a chosen text attack to derive the first bits of the key. This information suffices to manipulate blocks with a negligible chance of detection.
NFWO aspirant navorser, sponsored by the National Science Foundation of Belgium.
Chapter PDF
References
S.G. Akl, “On the Security of Compressed Encodings”, Advances in Cryptology, Proc. Crypto 83, Plenum Press, New York, p. 209–230.
E.F. Brickell, “A Survey of Hardware Implementations of RSA”, Advances in Cryptology, Proc. Crypto’ 89.
F. Cohen, “A Cryptographic Checksum for Integrity Protection”, Computers & Security, Vol. 6, p. 505–510, 1987.
I.B. Damgård, “Design principles for hash functions”, Advances in Cryptology, Proc. Crypto’ 89.
M. Girault, “Hash-functions Using Modulo-n Operations”, Advances in Cryptology, Proc. Crypto 86, Springer Verlag, p. 217–226.
G.H. Hardy and E.M. Wright, “An introduction to the theory of numbers. 5th edition.”, Oxford University Press, 1979.
F. Hoornaert, M. Decroos, J. Vandewalle and R. Govaerts, “Fast RSA-Hardware: Dream or Reality?”, Advances in Cryptology, Proc. Eurocrypt 88, Springer Verlag, p. 257–264.
Y.J. Huang and F. Cohen, “Some Weak Points of One Fast Cryptographic Checksum Algorithm and its Improvement”, Computers & Security, Vol. 7, p. 503–505, 1988.
R.R. Jueneman, “A High Speed Manipulation Detection Code”, Advances in Cryptology, Proc. Crypto 86, Springer Verlag, p. 327–347.
R.C. Merkle, “One way hash functions and DES”, Advances in Cryptology, Proc. Crypto’ 89.
S.F. Mjølsnes, “A Hash Of Some One-Way Hash functions and Birthdays”, preprint.
B. Preneel, R. Govaerts and J. Vandewalle, “Cryptographically Secure Hash Functions: an Overview”, Internal Report, ESAT Laboratories K.U.Leuven, 1989.
R.L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Comm. ACM, Vol. 21, No. 2, p. 120–126, 1978.
G.J. Simmons, “A Survey of Information Authentication”, Proc. IEEE, Vol. 76, No. 5, p. 603–620, 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Preneel, B., Bosselaers, A., Govaerts, R., Vandewalle, J. (1990). A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_15
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_15
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive