Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function

被引:0
|
作者
Ma, Bingke [1 ]
Li, Bao [1 ]
Hao, Ronglin [1 ]
Li, Xiaoqian [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
关键词
hash function; GOST; Whirlpool; multicollision; preimage; collision; limited-birthday distinguisher; PREIMAGE ATTACK;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The GOST hash function family has served as the new Russian national hash standard (GOST R 34.11-2012) since January 1, 2013, and it has two members, i.e., GOST-256 and GOST-512 which correspond to two different output lengths. Most of the previous analyses of GOST emphasize on the compression function rather than the hash function. In this paper, we focus on security properties of GOST under the hash function setting. First we give two improved preimage attacks on 6-round GOST-512 compared with the previous preimage attack, i.e., a time-reduced attack with the same memory requirements and a memoryless attack with almost identical time. Then we improve the best collision attack on reduced GOST-256 (resp. GOST-512) from 5 rounds to 6.5 (resp. 7.5) rounds. Finally, we construct a limited-birthday distinguisher on 9.5-round GOST using the limited-birthday distinguisher on hash functions proposed at ASIACRYPT 2013. An essential technique used in our distinguisher is the carefully chosen differential trail, which can further exploit freedom degrees in the inbound phase when launching rebound attacks on the GOST compression function. This technique helps us to reduce the time complexity of the distinguisher significantly. We apply this strategy to Whirlpool, an ISO standardized hash function, as well. As a result, we construct a limited-birthday distinguisher on 9-round Whirlpool out of 10 rounds, and reduce the time complexity of the previous 7-round distinguisher. To the best of our knowledge, all of our results are the best cryptanalytic results on GOST and Whirlpool in terms of the number of rounds analyzed under the hash function setting.
引用
收藏
页码:289 / 307
页数:19
相关论文
共 50 条
  • [1] Cryptanalysis of the Round-Reduced GOST Hash Function
    Zou, Jian
    Wu, Wenling
    Wu, Shuang
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 309 - 322
  • [2] Improved Collision Attacks on the Reduced-Round Grostl Hash Function
    Ideguchi, Kota
    Tischhauser, Elmar
    Preneel, Bart
    INFORMATION SECURITY, 2011, 6531 : 1 - 16
  • [3] Cryptanalysis of the GOST hash function
    Mendel, Florian
    Pramstaller, Norbert
    Rechberger, Christian
    Kontak, Marcin
    Szmidt, Janusz
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 162 - +
  • [4] Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia
    Wu, Wenling
    Zhang, Lei
    Zhang, Wentao
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5381 : 442 - 456
  • [5] Cryptanalysis of Reduced-Round Whirlwind
    Ma, Bingke
    Li, Bao
    Hao, Ronglin
    Li, Xiaoqian
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 20 - 38
  • [6] Cryptanalysis of Reduced-Round DASH
    刘树生
    龚征
    王立斌
    Journal of Computer Science & Technology, 2013, 28 (01) : 159 - 164
  • [7] Cryptanalysis of Reduced-Round SipHash
    He, Le
    Yu, Hongbo
    COMPUTER JOURNAL, 2023, 67 (03): : 875 - 883
  • [8] Cryptanalysis of GOST R hash function
    Wang, Zongyue
    Yu, Hongbo
    Wang, Xiaoyun
    INFORMATION PROCESSING LETTERS, 2014, 114 (12) : 655 - 662
  • [9] Cryptanalysis of reduced-round MISTY
    Kühn, U
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 325 - 339
  • [10] Cryptanalysis of Reduced-Round SPECK
    Ren, Jiongjiong
    Chen, Shaozhen
    IEEE ACCESS, 2019, 7 : 63045 - 63056