Collision Attack on NaSHA-384/512

被引:0
|
作者
Li, Zhimin [1 ]
Jiang, Hongan [1 ]
Li, Cunhua [1 ]
机构
[1] Huaihai Inst Technol, Sch Comp Engn, Lianyungang, Peoples R China
关键词
Hash function; NaSHA; Collision attack; Quasigroup operation; HASH FUNCTIONS; SHA-1;
D O I
10.1109/ICNIT.2010.5508519
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
NaSHA is a family of hash functions submitted by Markovski and Mileva, it is accepted as one of the first SHA-3 round candidates. In this paper, we present a collision attack on NaSHA for the output sizes 384-bit and 512-bit. This attack is based on the the weakness in the generate course of the state words, and the fact that the quasigroup operation used in the compression function are determined by partial state words. The time complexity of this attack is about 2(128) with negligible memory. This is currently by far the best known cryptanalysis result on this hash function.
引用
收藏
页码:243 / 246
页数:4
相关论文
共 50 条
  • [21] Collision attack on XTR and a countermeasure with a fixed pattern
    Han, DG
    Takagi, T
    Kim, TH
    Kim, HW
    Chung, KI
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 864 - 873
  • [22] Generative Collision Attack on Deep Image Hashing
    Ying, Luyang
    Xiong, Cheng
    Qin, Chuan
    Luo, Xiangyang
    Qian, Zhenxing
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2748 - 2762
  • [23] Collision attack on reduced-round Camellia
    Wenling Wu
    Dengguo Feng
    Science in China Series F: Information Sciences, 2005, 48 : 78 - 90
  • [24] NEW PSEUDO NEAR COLLISION ATTACK ON TIGER
    Mallik, Dibyendu
    Mukhopadhyay, Debdeep
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 427 - 430
  • [25] Collision attack on reduced-round Camellia
    Wu, WL
    Feng, DG
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (01): : 78 - 90
  • [26] Horizontal collision correlation attack on elliptic curves
    Bauer, Aurelie
    Jaulmes, Eliane
    Prouff, Emmanuel
    Reinhard, Jean-Rene
    Wild, Justine
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (01): : 91 - 119
  • [27] Collision attack on reduced-round Camellia
    WU Wenling & FENG Dengguo State Key Laboratory of Information Security
    Science in China(Series F:Information Sciences), 2005, (01) : 78 - 90
  • [28] Horizontal Collision Correlation Attack on Elliptic Curves
    Bauer, Aurelie
    Jaulmes, Eliane
    Prouff, Emmanuel
    Wild, Justine
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 553 - 570
  • [29] Improved collision attack on reduced round Camellia
    Guan Jie
    Zhang Zhongya
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 182 - +
  • [30] A new collision attack on MD5
    Wang Yu
    Chen Jianhua
    He Debiao
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 767 - 770