Pseudo-Cryptanalysis of Luffa
نویسندگان
چکیده
In this paper, we present the pseudo-collision, pseudo-second-preimage and pseudo-preimage attacks on the SHA-3 candidate algorithm Luffa. The pseudocollisions and pseudo-second-preimages can be found easily by computing the inverse of the message injection function at the beginning of Luffa. We explain in details the pseudo-preimage attacks. For Luffa-224/256, given the hash value, only 2 iteration computations are needed to get a pseudo-preimage. For Luffa384, finding a pseudo-preimage needs about 264 iteration computations with 267 bytes memory by the extended generalized birthday attack. For Luffa-512, the complexity is 2128 iteration computations with 2132 bytes memory. It is noted that, we can find the pseudo-collision pairs and the pseudo-second images only changing a few different bits of initial values. That is directly converted to the forgery attack on NMAC in related key cases.
منابع مشابه
Cryptanalysis of Luffa v2 Components
We develop a number of techniques for the cryptanalysis of the SHA-3 candidate Luffa, and apply them to various Luffa components. These techniques include a new variant of the rebound approach taking into account the specifics of Luffa. The main improvements include the construction of good truncated differential paths, the search for differences using multiple inbound phases and a fast final s...
متن کاملCompressive Behavior of Luffa Sponge Material at High Strain Rate
The strain rate effect of luffa sponge material is an indispensable property for it to be used for acoustic, vibration, and impact energy absorption. Compressive tests at different strain rates on cylindrical column specimens of luffa sponge material were conducted over a wide density ranging from 24 to 64 kg/m. A photographic technique was applied to measure the section area of the specimen wi...
متن کاملHigher Order Differential Attack on Step-Reduced Variants of Luffa v1
In this paper, a higher order differential attack on the hash function Luffa v1 is discussed. We confirmed that the algebraic degree of the permutation Qj which is an important non-linear component of Luffa grows slower than an ideal case both by the theoretical and the experimental approaches. According to our estimate, we can construct a distinguisher for step-reduced variants of Luffa v1 up ...
متن کاملPseudo-cryptanalysis of Blue Midnight Wish
We describe pseudo-collision and pseudo-(second) preimage attacks on the SHA-3 candidate Blue Midnight Wish. The complexity of the pseudo-collision attack is around 2, and the complexity of the pseudo-(second) preimage attack is around 2.
متن کاملGenus Luffa - an Ethnopharmacological and Phytochemical review
Luffa acutangula and Luffa cylindrica are the two important species under the genus Luffa. These two species are used by traditional medicinal practitioners for treating various human disorders. The phytochemical analysis of the various parts of these plants has revealed many phytoconstituents of medicinal importance. The wide distribution of these species has made it easily available and many ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009