Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n

被引:0
作者
Lamberger, Mario [1 ]
Mendel, Florian [1 ]
机构
[1] Graz Univ Technol, Inst Appl Informat Proc & Commun IAIK, A-8010 Graz, Austria
来源
INFORMATION SECURITY, PROCEEDINGS | 2009年 / 5735卷
关键词
Hash functions; collision attacks; preimage attacks; SHA-3; Blender; DCH; HASH FUNCTIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as well as in industry. There are 51 round one candidates building on sometimes very different principles. In this paper, we show how to attack two of the 51. round one hash functions. The attacks have in common that they exploit structural weaknesses in the design of the hash function and are independent of the underlying compression function. First, we present a preimage attack on the hash function Blender-n. It has a complexity of about n . 2(n/2) and negligible memory requirements. Secondly, we show practical collision and preimage attacks on DCH-n. To be more precise, we call trivially construct a (2(8) + 2)-block collision for DCH-n and a 1297-block preimage with only 521 compression function evaluations. The attacks on both hash functions work for all output sizes and render the hash functions broken.
引用
收藏
页码:68 / 78
页数:11
相关论文
共 26 条
[1]  
Andreeva E, 2008, LECT NOTES COMPUT SC, V4965, P270
[2]  
[Anonymous], 1997, ENCY MATH APPL
[3]  
[Anonymous], LNCS
[4]  
[Anonymous], LNCS
[5]  
Bertoni Guido., 2007, ECRYPT HASH WORKSHOP
[6]  
Biham Eli., 2007, FRAMEWORK ITERATIVE
[7]  
BRADBURY C, 2008, BLENDER PROPOSED NEW
[8]  
Damgard Ivan, 1989, LECT NOTES COMPUTER, V435, P416
[9]  
Ferguson N., 2009, 2009113 CRYPT EPRINT
[10]  
Gauravaram P, 2008, LECT NOTES COMPUT SC, V4964, P36, DOI 10.1007/978-3-540-79263-5_3