Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128

被引:0
|
作者
Mendel, Florian [1 ]
Nad, Tomislav [2 ]
Schlaeffer, Martin [2 ]
机构
[1] Katholieke Univ Leuven, ESAT COSIC & IBBT, Leuven, Belgium
[2] Graz Univ Technol, IAIK, Graz, Austria
来源
基金
奥地利科学基金会;
关键词
hash functions; RIPEMD-128; collisions; near-collisions; differential characteristic; message modification; automatic tool; PREIMAGE ATTACKS; SHA-1;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we analyze the security of RIPEMD-128 against collision attacks. The ISO/IEC standard RIPEMD-128 was proposed 15 years ago and may be used as a drop-in replacement for 128bit hash functions like MD5. Only few results have been published for RIPEMD-128, the best being a preimage attack for the first 33 steps of the hash function with complexity 2124.5. In this work, we provide a new assessment of the security margin of RIPEMD-128 by showing attacks on up to 48 (out of 64) steps of the hash function. We present a collision attack reduced to 38 steps and a near-collisions attack for 44 steps, both with practical complexity. Furthermore, we show non-random properties for 48 steps of the RIPEMD-128 hash function, and provide an example for a collision on the compression function for 48 steps. For all attacks we use complex nonlinear differential characteristics. Due to the more complicated dual-stream structure of RIPEMD-128 compared to its predecessor, finding high-probability characteristics as well as conforming message pairs is nontrivial. Doing any of these steps by hand is almost impossible or at least, very time consuming. We present a general strategy to analyze dual-stream hash functions and use an automatic search tool for the two main steps of the attack. Our tool is able to find differential characteristics and perform advanced message modification simultaneously in the two streams.
引用
收藏
页码:226 / 243
页数:18
相关论文
共 26 条
  • [1] Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160
    Ohtahara, Chiaki
    Sasaki, Yu
    Shimoyama, Takeshi
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 169 - +
  • [2] Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
    Ohtahara, Chiaki
    Sasaki, Yu
    Shimoyama, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (10) : 1729 - 1739
  • [3] (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach
    Wang, Lei
    Sasaki, Yu
    Komatsubara, Wataru
    Ohta, Kazuo
    Sakiyama, Kazuo
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 197 - +
  • [4] Cryptanalysis of reduced RIPEMD-128
    School of Mathematics and System Sciences, Shandong University, Ji'nan 250100, China
    不详
    Ruan Jian Xue Bao, 2008, 9 (2442-2448):
  • [5] Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
    Wang, Lei
    Sasaki, Yu
    Komatsubara, Wataru
    Sakiyama, Kazuo
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 100 - 110
  • [6] Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160
    Sasaki, Yu
    Wang, Lei
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01) : 177 - 190
  • [7] Improved Collision Attacks on the Reduced-Round Grostl Hash Function
    Ideguchi, Kota
    Tischhauser, Elmar
    Preneel, Bart
    INFORMATION SECURITY, 2011, 6531 : 1 - 16
  • [8] Collision and second preimage attacks on the HTBC hash function
    Ma, Bingke, 1600, Science Press (51):
  • [9] Rebound Attacks on the Reduced Grostl Hash Function
    Mendel, Florian
    Rechberger, Christian
    Schlaeffer, Martin
    Thomsen, Soren S.
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 350 - +
  • [10] Collision attack against Tav-128 hash function
    Hariyanto, Fajar
    Susanti, Bety Hayat
    ASIAN MATHEMATICAL CONFERENCE 2016 (AMC 2016), 2017, 893