Intersection Coupling for birthday attacks and collision of independent walks on Z

نویسنده

  • Ravi Montenegro
چکیده

We develop a version of coupling which can be used to study many birthday attacks, simplifying a key step in past analysis and making it possible to extend the analysis to additional problems. This leads us to confirm a conjecture of Pollard’s that the Kangaroo method starting in an interval of size N with steps sizes {x}k=1 for fixed x has the same collision time of (2 + o(1)) √ N as does x = 2. Furthermore we partially answer a question he poses regarding the case when the number of generators d is fixed and the base x is variable, by showing that when d = 3 the collision time is order O( √ N ln N) and giving strong evidence that it is Θ( √ N ln N), while for d ≥ 4 the collision time is shown to be order Θ(√N).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A simple method for precisely determining complexity of many Birthday attacks

We show a simple and yet very precise upper bound on self-intersection time of a Markov chain, i.e. the expected number of steps until some state has been visited twice. When applied to certain birthday attacks the bound matches even the lead coefficient in simulation data to over 4 significant digits. This precision makes it possible to explain the differing performance between attacks that ar...

متن کامل

MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners

We consider a long standing problem in cryptanalysis: attacks on hash function combiners. In this paper, we propose the first attack that allows collision attacks on combiners with a runtime below the birthday-bound of the smaller compression function. This answers an open question by Joux posed in 2004. As a concrete example we give such an attack on combiners with the widely used hash functio...

متن کامل

Modeling Multiple–Vehicle Property Damage Collisions in Urban Signalized Intersections

Development of disaggregate models for estimating different property damage collision type frequencies in urban intersections has rarely been studied, particularly in Iran. It seems very little research work being implemented for studying the effect factors on collision type frequency at intersections. The main objective of this paper is to develop suitable statistical models to predict types o...

متن کامل

Identification of Hazardous Situations using Kernel Density Estimation Method Based on Time to Collision, Case study: Left-turn on Unsignalized Intersection

The first step in improving traffic safety is identifying hazardous situations. Based on traffic accidents’ data, identifying hazardous situations in roads and the network is possible. However, in small areas such as intersections, especially in maneuvers resolution, identifying hazardous situations is impossible using accident’s data. In this paper, time-to-collision (TTC) as a traffic conflic...

متن کامل

Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security

Abstract. The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO’94. We present the first generic collision and preimage attacks against this function, in the sense that the attacks work for any parameters of the function. Their complexity is the cubic root of the birthday bound; for the parameters initially suggested by Tillich and Zémor they are very close to b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012