Time-Space Lower Bounds for Finding Collisions in Merkle-Damgård Hash Functions

Abstract

We revisit the problem of finding BB-block-long collisions in Merkle-Damgård Hash Functions in the auxiliary-input random oracle model, in which an attacker gets a piece of SS-bit advice about the random oracle and makes TT oracle queries. Akshima, Cash, Drucker and Wee (CRYPTO 2020), based on the work of Coretti, Dodis, Guo and Steinberger (EUROCRYPT 2018), showed a simple attack for 2BT2\leq B\leq T (with respect to a random salt). The attack achieves advantage Ω(STB/2n+T2/2n){\Omega}(STB/2^n+T^2/2^n) where nn is the output length of the random oracle. They conjectured that this attack is optimal. However, this so-called STB conjecture was only proved for BTB\approx T and B=2B=2. Very recently, Ghoshal and Komargodski (CRYPTO 22) confirmed STB conjecture for all constant values of BB, and provided an O(S4TB2/2n+T2/2n){O}(S^4TB^2/2^n+T^2/2^n) bound for all choices of BB. In this work, we prove an O((STB/2n)max{1,ST2/2n}+T2/2n){O}((STB/2^n)\cdot\max\{1,ST^2/2^n\}+ T^2/2^n) bound for every 22n22^n (note as T2T^2 is always at most 2n2^n, otherwise finding a collision is trivial by the birthday attack). Our result subsumes all previous upper bounds for all ranges of parameters except for B=O(1)B={O}(1) and ST2>2nST^2>2^n. We obtain our results by adopting and refining the technique of Chung, Guo, Liu, and Qian (FOCS 2020). Our approach yields more modular proofs and sheds light on how to bypass the limitations of prior techniques. Along the way, we obtain a considerably simpler and illuminating proof for B=2B=2, recovering the main result of Akshima, Cash, Drucker and Wee

    Similar works