Advertisement

Birthday Paradox for Multi-collisions

  • Kazuhiro Suzuki
  • Dongvu Tonien
  • Kaoru Kurosawa
  • Koji Toyota
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4296)

Abstract

In this paper, we study multi-collision probability. For a hash function H:DR with |R|=n, it has been believed that we can find an s-collision by hashing Q=n ( s − − 1)/ s times. We first show that this probability is at most 1/s! which is very small for large s. We next show that by hashing (s!)1/ s ×Q times, an s-collision is found with probability approximately 0.5 for sufficiently large n. Note that if s=2, it coincides with the usual birthday paradox. Hence it is a generalization of the birthday paradox to multi-collisions.

Keywords

hash function birthday paradox multi-collision collision resistant 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bellare, M., Kilian, J., Rogaway, P.: The Security of the Cipher Block Chaining Message Authentication Code. J. Comput. Syst. Sci. 61(3), 362–399 (2000)MATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    Bellare, M., Kohno, T.: Hash Function Balance and Its Impact on Birthday Attacks. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 401–418. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Brickell, E., Pointcheval, D., Vaudenay, S., Yung, M.: Design Validations for Discrete Logarithm Based Signature Schemes. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 276–292. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Girault, M., Stern, J.: On the Length of Cryptographic Hash-Values Used in Identification Schemes. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 202–215. Springer, Heidelberg (1994)Google Scholar
  5. 5.
    Joux, A.: Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 306–316. Springer, Heidelberg (2004)Google Scholar
  6. 6.
    Rivest, R., Shamir, A.: PayWord and MicroMint: Two Simple Micropayment Schemes. In: Security Protocols Workshop 1996, pp. 69–87 (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Kazuhiro Suzuki
    • 1
  • Dongvu Tonien
    • 2
  • Kaoru Kurosawa
    • 3
  • Koji Toyota
    • 3
  1. 1.Venture Business LaboratoryIbaraki UniversityIbarakiJapan
  2. 2.School of Information Technology and Computer ScienceUniversity of WollongongWollongongAustralia
  3. 3.Department of Computer and Information SciencesIbaraki UniversityIbarakiJapan

Personalised recommendations