Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL

被引:0
|
作者
Lee, Eunjin [1 ]
Chang, Donghoon [1 ]
Kim, Jongsung [1 ]
Sung, Jaechul [2 ]
Hong, Seokhie [1 ]
机构
[1] Korea Univ, CIST, Seoul, South Korea
[2] Univ Seoul, Seoul, South Korea
来源
FAST SOFTWARE ENCRYPTION | 2008年 / 5086卷
关键词
HAVAL; NMAC; HMAC; Second preimage attack; Key recovery attack;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In 1992, Zheng, Pieprzyk and Seberry proposed a one-way hashing algorithm called HAVAL, which compresses a message of arbitrary length into a digest of 128, 160, 192, 224 or 256 bits. It operates in so called passes where each pass contains 32 steps. The number of passes can be chosen equal to 3, 4 or 5. In this paper, we devise a new differential path of 3-pass HAVAL with probability 2(-114), which allows us to design a second preimage attack on 3-pass HAVAL and partial key recovery attacks on HMAC/NMAC-3-pass HAVAL. Our partial key-recovery attack works with 2 122 oracle queries, 5 . 2(32) memory bytes and 2(96) 3-pass HAVAL computations.
引用
收藏
页码:189 / +
页数:3
相关论文
共 13 条
  • [1] Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
    Wang, Gaoli
    Wang, Shaohui
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 1 - +
  • [2] Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL
    Yu, Hongbo
    Wang, Xiaoyun
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 285 - +
  • [3] Improved preimage attack on 3-pass HAVAL
    Zhong J.-M.
    Lai X.-J.
    Duan M.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (6) : 713 - 721
  • [4] Improved Preimage Attack on 3-Pass HAVAL
    钟锦敏
    来学嘉
    段明
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (06) : 713 - 721
  • [5] Cryptanalysis of 3-pass HAVAL
    Van Rompay, B
    Biryukov, A
    Preneel, B
    Vandewalle, J
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 228 - 245
  • [6] Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
    Aumasson, Jean-Philippe
    Meier, Willi
    Mendel, Florian
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 120 - +
  • [7] Preimage Attacks on 3, 4, and 5-Pass HAVAL
    Sasaki, Yu
    Aoki, Kazumaro
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 253 - 271
  • [8] On the security of reduced versions of 3-pass HAVAL
    Park, S
    Sung, SH
    Chee, S
    Lim, J
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 406 - 419
  • [9] How to find many collisions of 3-pass HAVAL
    Suzuki, Kazuhiro
    Kurosawa, Kaoru
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 428 - +
  • [10] Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
    Sasaki, Yu
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 79 - 94