Improved Collision Attacks on the Reduced-Round Grostl Hash Function

被引:0
|
作者
Ideguchi, Kota [1 ]
Tischhauser, Elmar [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC, B-3001 Heverlee, Belgium
来源
INFORMATION SECURITY | 2011年 / 6531卷
关键词
Hash Function; Differential Cryptanalysis; SHA-3; COMPRESSION FUNCTION; CRYPTANALYSIS; AES; WHIRLPOOL; SHA-1;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze the Grostl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using the start-from-the-middle variant of the rebound technique, we show collision attacks on the Grostl-256 hash function reduced to 5 and 6 out of 10 rounds with time complexities 248 and 21127 respectively. Furthermore, we demonstrate semi-free-start collision attacks on the Grostl-224 and -256 hash functions reduced to 7 rounds and the Grostl-224 and -256 compression functions reduced to 8 rounds. Our attacks are based on differential paths between the two permutations P and Q of Grostl, a strategy introduced by Peyrin to construct distinguishers for the compression function. In this paper, we extend this approach to construct collision and semi-free-start collision attacks for both the hash and the compression function. Finally, we present improved distinguishers for reduced-round versions of the Grostl-224 and -256 permutations.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [21] Improved key recovery attacks on reduced-round Salsa20
    Dey, Sabyasachi
    Leander, Gregor
    Sharma, Nitin Kumar
    DESIGNS CODES AND CRYPTOGRAPHY, 2025, 93 (01) : 243 - 262
  • [22] Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grostl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions
    Ma, Bingke
    Li, Bao
    Hao, Ronglin
    Li, Xiaoqian
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 79 - 96
  • [23] Collision attack and pseudorandomness of reduced-round Camellia
    Wu, WL
    Feng, DG
    Chen, H
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 252 - 266
  • [24] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128
    Liu, Ya
    Yang, Anren
    Dai, Bo
    Li, Wei
    Liu, Zhiqiang
    Gu, Dawu
    Zeng, Zhiqiang
    COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258
  • [25] Improved key-recovery attacks on reduced-round WEM-8
    Jun Liu
    Dachao Wang
    Yupu Hu
    Jie Chen
    Baocang Wang
    Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
  • [26] Improved key-recovery attacks on reduced-round WEM-8
    Liu, Jun
    Wang, Dachao
    Hu, Yupu
    Chen, Jie
    Wang, Baocang
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (10) : 2419 - 2448
  • [27] Improved meet-in-the-middle attacks on reduced-round Joltik-BC
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2021, 15 (03) : 247 - 255
  • [28] Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3512
    Bouillaguet, Charles
    Dunkelman, Orr
    Leurent, Gaean
    Fouquel, Pierre-Alain
    SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 18 - 35
  • [29] New attacks against reduced-round versions of IDEA
    Junod, P
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 384 - 397
  • [30] On the Indifferentiability of the Grostl Hash Function
    Andreeva, Elena
    Mennink, Bart
    Preneel, Bart
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 88 - 105