Improved Collision Attacks on the Reduced-Round Grostl Hash Function

被引:0
|
作者
Ideguchi, Kota [1 ]
Tischhauser, Elmar [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC, B-3001 Heverlee, Belgium
来源
INFORMATION SECURITY | 2011年 / 6531卷
关键词
Hash Function; Differential Cryptanalysis; SHA-3; COMPRESSION FUNCTION; CRYPTANALYSIS; AES; WHIRLPOOL; SHA-1;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze the Grostl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using the start-from-the-middle variant of the rebound technique, we show collision attacks on the Grostl-256 hash function reduced to 5 and 6 out of 10 rounds with time complexities 248 and 21127 respectively. Furthermore, we demonstrate semi-free-start collision attacks on the Grostl-224 and -256 hash functions reduced to 7 rounds and the Grostl-224 and -256 compression functions reduced to 8 rounds. Our attacks are based on differential paths between the two permutations P and Q of Grostl, a strategy introduced by Peyrin to construct distinguishers for the compression function. In this paper, we extend this approach to construct collision and semi-free-start collision attacks for both the hash and the compression function. Finally, we present improved distinguishers for reduced-round versions of the Grostl-224 and -256 permutations.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [1] Internal differential collision attacks on the reduced-round Grostl-0 hash function
    Ideguchi, Kota
    Tischhauser, Elmar
    Preneel, Bart
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 70 (03) : 251 - 271
  • [2] Internal differential collision attacks on the reduced-round Grøstl-0 hash function
    Kota Ideguchi
    Elmar Tischhauser
    Bart Preneel
    Designs, Codes and Cryptography, 2014, 70 : 251 - 271
  • [3] Rebound Attacks on the Reduced Grostl Hash Function
    Mendel, Florian
    Rechberger, Christian
    Schlaeffer, Martin
    Thomsen, Soren S.
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 350 - +
  • [4] Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function
    Ma, Bingke
    Li, Bao
    Hao, Ronglin
    Li, Xiaoqian
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 289 - 307
  • [5] Improved attacks against reduced-round Whirlwind
    Wei, Congming
    Dong, Bingyou
    Hua, Jialiang
    Dong, Xiaoyang
    Zhang, Guoyan
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3581 - 3602
  • [6] Improved attacks against reduced-round Whirlwind
    Congming Wei
    Bingyou Dong
    Jialiang Hua
    Xiaoyang Dong
    Guoyan Zhang
    Designs, Codes and Cryptography, 2023, 91 : 3581 - 3602
  • [7] Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function
    Zou, Jian
    Wu, Wenling
    Wu, Shuang
    Dong, Le
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (06) : 1789 - 1806
  • [8] Improved SQUARE attacks against reduced-round HIEROCRYPT
    Barreto, PSLM
    Rijmen, V
    Nakahara, J
    Preneel, B
    Vandewalle, J
    Kim, HY
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 165 - 173
  • [9] Quantum rebound attacks on reduced-round ARIA-based hash functions
    Baek, Seungjun
    Kim, Jongsung
    ETRI JOURNAL, 2023, 45 (03) : 365 - 378
  • [10] (Pseudo) Preimage Attack on Round-Reduced Grostl Hash Function and Others
    Wu, Shuang
    Feng, Dengguo
    Wu, Wenling
    Guo, Jian
    Dong, Le
    Zou, Jian
    FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 127 - 145