Intersection Coupling for birthday attacks and collision of independent walks on Z
نویسنده
چکیده
We develop a version of coupling which can be used to study many birthday attacks, simplifying a key step in past analysis and making it possible to extend the analysis to additional problems. This leads us to confirm a conjecture of Pollard’s that the Kangaroo method starting in an interval of size N with steps sizes {x}k=1 for fixed x has the same collision time of (2 + o(1)) √ N as does x = 2. Furthermore we partially answer a question he poses regarding the case when the number of generators d is fixed and the base x is variable, by showing that when d = 3 the collision time is order O( √ N ln N) and giving strong evidence that it is Θ( √ N ln N), while for d ≥ 4 the collision time is shown to be order Θ(√N).
منابع مشابه
A simple method for precisely determining complexity of many Birthday attacks
We show a simple and yet very precise upper bound on self-intersection time of a Markov chain, i.e. the expected number of steps until some state has been visited twice. When applied to certain birthday attacks the bound matches even the lead coefficient in simulation data to over 4 significant digits. This precision makes it possible to explain the differing performance between attacks that ar...
متن کاملMD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
We consider a long standing problem in cryptanalysis: attacks on hash function combiners. In this paper, we propose the first attack that allows collision attacks on combiners with a runtime below the birthday-bound of the smaller compression function. This answers an open question by Joux posed in 2004. As a concrete example we give such an attack on combiners with the widely used hash functio...
متن کاملModeling Multiple–Vehicle Property Damage Collisions in Urban Signalized Intersections
Development of disaggregate models for estimating different property damage collision type frequencies in urban intersections has rarely been studied, particularly in Iran. It seems very little research work being implemented for studying the effect factors on collision type frequency at intersections. The main objective of this paper is to develop suitable statistical models to predict types o...
متن کاملIdentification of Hazardous Situations using Kernel Density Estimation Method Based on Time to Collision, Case study: Left-turn on Unsignalized Intersection
The first step in improving traffic safety is identifying hazardous situations. Based on traffic accidents’ data, identifying hazardous situations in roads and the network is possible. However, in small areas such as intersections, especially in maneuvers resolution, identifying hazardous situations is impossible using accident’s data. In this paper, time-to-collision (TTC) as a traffic conflic...
متن کاملHard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security
Abstract. The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO’94. We present the first generic collision and preimage attacks against this function, in the sense that the attacks work for any parameters of the function. Their complexity is the cubic root of the birthday bound; for the parameters initially suggested by Tillich and Zémor they are very close to b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012