Second Preimage Attack on SHAMATA-512
نویسندگان
چکیده
We present a second preimage attack on SHAMATA-512, which is a hash function of 512bit output and one of the first round candidates of the SHA-3 competition. The attack uses differential paths that hold with a probability one and a meet-in-the-middle approach to find second preimages. The time complexity is about 2 computation of the step function and the memory complexity is about 2 blocks of 128 bits. 1 Short Description of SHAMATA-512 The hash function SHAMATA[1] is a register based hash function. The internal state (chaining value) is of 2048-bit length and stored in 16 128-bit registers; four B registers and twelve K registers. A message is padded to a multiple of 128 bits and the message blocks are processed by the step function sequentially. Let pad(x) = M0||M1|| · · · ||Ml−1 be a l-block padded message. The hash value y = H(x) is computed as follows: S0 = Initialization(IV ), Si+1 = StepFunction(Si,Mi, i), i = 0, 1, · · · , l − 1 y = Finalization(Sl, l), where Si is the internal state before the i-th step is applied. We call the update process, described by Si+1 = StepFunction(Si,Mi, i), the i-th step. The StepFunction is called UpdateRegister in the specification of the hash function. [email protected] [email protected]
منابع مشابه
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
This paper studies two types of attacks on the hash function Shabal. The first attack is a low-weight pseudo collision attack on Shabal. Since a pseudo collision attack is trivial for Shabal, we focus on a low-weight pseudo collision attack. It means that only low-weight difference in a chaining value is considered. By analyzing the difference propagation in the underlying permutation, we can c...
متن کاملPreimage Attacks on Reduced Tiger and SHA-2
This paper shows new preimage attacks on reduced Tiger and SHA-2. Indesteege and Preneel presented a preimage attack on Tiger reduced to 13 rounds (out of 24) with a complexity of 2. Our new preimage attack finds a one-block preimage of Tiger reduced to 16 rounds with a complexity of 2. The proposed attack is based on meet-in-themiddle attacks. It seems difficult to find “independent words” of ...
متن کاملQuantum Preimage and Collision Attacks on CubeHash
In this paper we show a quantum preimage attack on CubeHash-512-normal with complexity 2. This kind of attack is expected to cost 2 for a good 512-bit hash function, and we argue that this violates the expected security of CubeHash. The preimage attack can also be used as a collision attack, given that a generic quantum collision attack on a 512-bit hash function require 2 operations, as explai...
متن کاملPractical Collisions for SHAMATA-256
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function design with components of the AES, and it is one of the fastest submitted hash functions. In our attack, we show weaknesses in the message injection and state update of SHAMATA. It is possible to find certain message differences that do not get changed by the message expan...
متن کاملPractical (Second) Preimage Attacks on TCS_SHA-3
TCS SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 2009/0262925). The digest sizes are 224, 256, 384 and 512 bits. The hash functions use bijective functions in place of the standard, compression functions. In this paper we describe first and second preimage attacks on the full hash functions. The second preimage attack requires negligible time and t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009