Juha Kortelainen
University of Oulu
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Juha Kortelainen.
Journal of Mathematical Cryptology | 2010
Juha Kortelainen; Kimmo Halunen; Tuomas Kortelainen
Abstract We apply combinatorics on words to develop an approach to multicollisions in generalized iterated hash functions. Our work is based on the discoveries of A. Joux and on generalizations provided by M. Nandi and D. Stinson as well as J. Hoch and A. Shamir. We wish to unify the existing diverse notation in the field, bring basic facts together, reprove some previously published results and produce some new ones. A multicollision attack method informally described by Hoch and Shamir is laid on a sound statistical basis and studied in detail.
international conference on formal engineering methods | 2009
Antti Siirtola; Juha Kortelainen
We consider parameterised verification problem, where parameters are sets and relations over these sets, typically used to denote sets of identities of replicated components and connections between the components. A specification and a system are given as (multiply) parameterised labelled transition systems, parameter values are encoded using first-order logic and correctness is understood as the traces refinement. We provide an algorithm that reduces the (infinite) set of parameter values to a finite one without changing the answer to the verification task, which can be then solved with the aid of existing tools. To the best of our knowledge, the algorithm is the most general one that is both complete and applicable to systems with multiple and nested parameters.
international conference on the theory and application of cryptology and information security | 2013
Tuomas Kortelainen; Juha Kortelainen
The first part of this paper considers the diamond structures which were first introduced and applied in the herding attack by Kelsey and Kohno [7]. We present a new method for the construction of a diamond structure with 2 d chaining values the message complexity of which is \(\mathrm{O}(2^{\frac{n+d}{2}})\). Here n is the length of the compression function used. The aforementioned complexity was (with intuitive reasoning) suggested to be true in [7] and later disputed by Blackburn et al. in [3]. In the second part of our paper we give new, efficient variants for the two types of Trojan message attacks against Merkle-Damgard hash functions presented by Andreeva et al. [1] The message complexities of the Collision Trojan Attack and the stronger Herding Trojan Attack in [1] are \(\mathrm{O}(2^{\frac{n}{2}+r})\) and \(\mathrm{O}(2^{\frac{2n}{3}}+2^{\frac{n}{2}+r})\), respectively. Our variants of the above two attack types are the Weak Trojan Attack and the Strong Trojan Attack having the complexities \(\mathrm{O}(2^{\frac{n+r}{2}})\) and \(\mathrm{O}(2^{\frac{2n-s}{3}}+2^{\frac{n+r}{2}})\), respectively. Here 2 r is the cardinality of the prefix set and 2 s is the length of the Trojan message in the Strong Trojan Attack.
computing and combinatorics conference | 2013
Juha Kortelainen; Tuomas Kortelainen; Ari Vesanen
AbstractTraditionally in combinatorics on words one studies unavoidable regularities that appear in sufficiently long strings over a fixed size alphabet. Inspired by permutation problems originating from information security, another viewpoint is taken in this paper. We focus on combinatorial properties of long words in which the number of occurrences of any symbol is restricted by a fixed given constant. More precisely, we show that for all positive integers m and q there exists the least positive integer N(m,q) which is smaller than
international conference on application of concurrency to system design | 2009
Antti Siirtola; Juha Kortelainen
m^{2^{q-1}}
international conference on information security and cryptology | 2010
Tuomas Kortelainen; Juha Kortelainen; Kimmo Halunen
and satisfies the following: If α is a word such that (i)|alph(α)|≥N(m,q) (i.e., the cardinality of the alphabet of α is at least N(m,q)); and(ii)|α|a≤q for each a∈alph(α) (i.e., the number of occurrences of any symbol of alph(α) in α is at most q), then there exist a set A⊆alph(α) of cardinality |A|=m, an integer p∈{1,2,…,q}, and permutations σ1,σ2,…,σp:{1,2,…,m}→{1,2,…,m} for which
Theoretical Informatics and Applications | 2001
Štěpán Holub; Juha Kortelainen
Acta Informatica | 1997
Ismo Hakala; Juha Kortelainen
\pi_A(\alpha)\in a_{\sigma_1(1)}^+\cdots a_{\sigma_1(m)}^+a_{\sigma _2(1)}^+\cdots a_{\sigma_2(m)}^+\cdots a_{\sigma_p(1)}^+\cdots a_{\sigma_p(m)}^+ .
Information & Computation | 2015
Antti Siirtola; Juha Kortelainen
Theoretical Computer Science | 1999
Ismo Hakala; Juha Kortelainen
Here A={a1,a2,…,am} and πA is the projection morphism from alph(α)∗ into A∗. The second part of the paper considers information security. We give an introduction to (generalized iterated) hash functions and their security properties; finally we demonstrate how our combinatorial results are connected to constructing multicollision attacks on these functions.