Improved Collision Attacks on the Reduced-Round Grostl Hash Function

被引:0
|
作者
Ideguchi, Kota [1 ]
Tischhauser, Elmar [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC, B-3001 Heverlee, Belgium
来源
INFORMATION SECURITY | 2011年 / 6531卷
关键词
Hash Function; Differential Cryptanalysis; SHA-3; COMPRESSION FUNCTION; CRYPTANALYSIS; AES; WHIRLPOOL; SHA-1;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We analyze the Grostl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using the start-from-the-middle variant of the rebound technique, we show collision attacks on the Grostl-256 hash function reduced to 5 and 6 out of 10 rounds with time complexities 248 and 21127 respectively. Furthermore, we demonstrate semi-free-start collision attacks on the Grostl-224 and -256 hash functions reduced to 7 rounds and the Grostl-224 and -256 compression functions reduced to 8 rounds. Our attacks are based on differential paths between the two permutations P and Q of Grostl, a strategy introduced by Peyrin to construct distinguishers for the compression function. In this paper, we extend this approach to construct collision and semi-free-start collision attacks for both the hash and the compression function. Finally, we present improved distinguishers for reduced-round versions of the Grostl-224 and -256 permutations.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [41] Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G⊕
    Biryukov, Alex
    Priemuth-Schmid, Deike
    Zhang, Bin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 139 - 153
  • [42] Improved related-key impossible differential attacks on reduced-round AES-192
    Zhang, Wentao
    Wu, Wenling
    Zhang, Lei
    Feng, Dengguo
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4356 : 15 - +
  • [43] Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
    Cui, Tingting
    Grassi, Lorenzo
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 171 - 197
  • [44] Related-Key Differential Attacks on Reduced-Round LBlock
    Weng, Tianling
    Cui, Tingting
    Yang, Ting
    Guo, Yinghua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [45] Practical Attacks on Reduced-Round 3D and Saturnin
    Hou, Tao
    Cui, Ting
    Zhang, Jiyan
    COMPUTER JOURNAL, 2023, 66 (02): : 479 - 495
  • [46] Differential and rectangle attacks on reduced-round SHACAL-1
    Lu, Jiqiang
    Kim, Jongsung
    Keller, Nathan
    Dunkelman, Orr
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 17 - +
  • [47] Improved Differential Attacks for ECHO and Grostl
    Peyrin, Thomas
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 370 - 392
  • [48] Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
    Wu, Wenling
    Zhang, Lei
    Zhang, Wentao
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 442 - 456
  • [49] Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC
    Li, Manman
    Chen, Shaozhen
    COMPUTER JOURNAL, 2022, 65 (09): : 2411 - 2420
  • [50] Improved differential attacks on the reduced-round SNOW-V and SNOW-Vi stream cipher
    Ma, Sudong
    Jin, Chenhui
    Guan, Jie
    Liu, Shuai
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71