Collision Attack on NaSHA-384/512

被引:0
|
作者
Li, Zhimin [1 ]
Jiang, Hongan [1 ]
Li, Cunhua [1 ]
机构
[1] Huaihai Inst Technol, Sch Comp Engn, Lianyungang, Peoples R China
关键词
Hash function; NaSHA; Collision attack; Quasigroup operation; HASH FUNCTIONS; SHA-1;
D O I
10.1109/ICNIT.2010.5508519
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
NaSHA is a family of hash functions submitted by Markovski and Mileva, it is accepted as one of the first SHA-3 round candidates. In this paper, we present a collision attack on NaSHA for the output sizes 384-bit and 512-bit. This attack is based on the the weakness in the generate course of the state words, and the fact that the quasigroup operation used in the compression function are determined by partial state words. The time complexity of this attack is about 2(128) with negligible memory. This is currently by far the best known cryptanalysis result on this hash function.
引用
收藏
页码:243 / 246
页数:4
相关论文
共 50 条
  • [1] Second Preimage Attack on SHAMATA-512
    Ideguchi, Kota
    Watanabe, Dai
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 169 - 181
  • [2] Stochastic Collision Attack
    Bruneau, Nicolas
    Carlet, Claude
    Guilley, Sylvain
    Heuser, Annelie
    Prouff, Emmanuel
    Rioul, Olivier
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (09) : 2090 - 2104
  • [3] Collision Attack on Boole
    Mendel, Florian
    Nad, Tomislav
    Schlaeffer, Martin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 369 - 381
  • [4] Collision Attack on Grindahl
    Peyrin, Thomas
    JOURNAL OF CRYPTOLOGY, 2015, 28 (04) : 879 - 898
  • [5] Group Collision Attack
    Ou, Changhai
    Wang, Zhu
    Sun, Degang
    Zhou, Xinping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (04) : 939 - 953
  • [6] Collision Attack on Grindahl
    Thomas Peyrin
    Journal of Cryptology, 2015, 28 : 879 - 898
  • [7] An Energy Efficient Programmable Hardware Implementation of the Secure Hash 384 and 512 Algorithms
    Zaidi, Syed Mohsin Reza
    Hasan, M.
    IETE JOURNAL OF RESEARCH, 2007, 53 (05) : 451 - 457
  • [8] GENERATION OF GENERAL SYSTEM PARAMETERS FOR FALCON CRYPTOSYSTEM FOR 256, 384, AND 512 SECURITY BITS
    Gorbenko I.D.
    Kandy S.O.
    Yesina M.V.
    Ostryanska Y.V.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2022, 81 (02): : 49 - 59
  • [9] Efficient single-chip implementation of SHA-384 & SHA-512
    McLoone, M
    McCanny, JV
    2002 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2002, : 311 - 314
  • [10] The hardware implementations of the SHA-2 (256,384,512) hash functions
    Sklavos, N
    Koufopavlou, O
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL V: BIO-MEDICAL CIRCUITS & SYSTEMS, VLSI SYSTEMS & APPLICATIONS, NEURAL NETWORKS & SYSTEMS, 2003, : 153 - 156