How to find many collisions of 3-pass HAVAL

被引:0
|
作者
Suzuki, Kazuhiro [1 ]
Kurosawa, Kaoru [2 ]
机构
[1] Ibaraki Univ, Venture Business Lab, Hitachi, Ibaraki 3168511, Japan
[2] Ibaraki Univ, Dept Comp & Informat Sci, Hitachi, Ibaraki 3168511, Japan
关键词
hash function; HAVAL; collision; differential attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The hash function HAVAL is a well known Merkle-Damgard hash function such as MD4 and MD5. It has three variants, 3-, 4- and 5-pass HAVAL. On 3-pass HAVAL, the best known attack finds a collision pair with 2 7 computations of the compression function. To find k collision pairs, it requires 2(7)k computations. In this paper, we present a better collision attack on 3-pass HAVAL, which can find k collision pairs with only 2k + 33 computations. Further, our message differential is different from the previous ones. It is important to find collisions for different message differentials.
引用
收藏
页码:428 / +
页数:4
相关论文
共 50 条
  • [1] Cryptanalysis of 3-pass HAVAL
    Van Rompay, B
    Biryukov, A
    Preneel, B
    Vandewalle, J
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 228 - 245
  • [2] Improved preimage attack on 3-pass HAVAL
    Zhong J.-M.
    Lai X.-J.
    Duan M.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (6) : 713 - 721
  • [3] Improved Preimage Attack on 3-Pass HAVAL
    钟锦敏
    来学嘉
    段明
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (06) : 713 - 721
  • [4] On the security of reduced versions of 3-pass HAVAL
    Park, S
    Sung, SH
    Chee, S
    Lim, J
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 406 - 419
  • [5] On the security of yet another reduced version of 3-pass HAVAL
    Her, YS
    Sakurai, K
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 137 - 137
  • [6] Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
    Lee, Eunjin
    Chang, Donghoon
    Kim, Jongsung
    Sung, Jaechul
    Hong, Seokhie
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 189 - +
  • [7] Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
    Sasaki, Yu
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 79 - 94
  • [8] How to find the sufficient collision conditions for haval-128 pass 3 by backward analysis
    Thorncharoensri, Pairat
    Xia, Tianbing
    Mu, Yi
    International Journal of Network Security, 2007, 4 (02) : 138 - 148
  • [9] Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
    Aumasson, Jean-Philippe
    Meier, Willi
    Mendel, Florian
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 120 - +
  • [10] Multi-collision attack on the compression functions of MD4 and 3-pass HAVAL
    Yu, Hongbo
    Wang, Xiaoyun
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 206 - +