Advanced SearchSearch Tips
A Preimage Attack on the MJH Hash Function
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Preimage Attack on the MJH Hash Function
Lee, Jooyoung; Kim, Jongsung;
  PDF(new window)
In this paper, we present a new preimage attack on MJH, a double-block-length block cipher-based hash function. Currently, the best attack requires queries for the 2n-bit MJH hash function based on an n-bit block cipher, while our attack requires queries and the same amount of memory, significantly improving the query complexity compared to the existing attack.
Hash function;Preimage attack;Block ciphers;
 Cited by
M. Bona, "A Walk Through Combinatorics: An Introduction to Enumeration and Graph Theory," 3rd Edition, pp. 134-136, May 2006.

D. Hong and D. Kwon, "Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E97-A, No. 8, pp. 1747-1753, August 2014. crossref(new window)

L. R. Knudsen, F. Mendel, C. Rechberger and S. S. Thomsen, "Cryptanalysis of MDC-2," Eurocrypt 2009, LNCS 5479, pp. 106-120, April 2009.

J. Lee and M. Stam, "MJH: a faster alternative to MDC-2," Designs, Codes and Cryptography, Vol. 76. Issue 2. pp. 179-205, August 2015. crossref(new window)