Preimage Attacks on 3, 4, and 5-Pass HAVAL

作者: Yu Sasaki , Kazumaro Aoki

DOI: 10.1007/978-3-540-89255-7_16

关键词:

摘要: This paper proposes preimage attacks on hash function HAVAL whose output length is 256 bits. has three main contributions; a attack 3-pass at the complexity of 2225, 4-pass 2241, and 5-pass reduced to 151 steps 2241. Moreover, we optimize computational order for brute-force full its 2254.89. As far as know, proposed best there no so HAVAL. Note that previous 2230. Technically, our find pseudo-preimages by combining meet-in-the-middle local-collision approaches, then convert using generic algorithm.

参考文章(28)
Josef Pieprzyk, Jennifer Seberry, Yuliang Zheng, HAVAL - A One-Way Hashing Algorithm with Variable Length of Output theory and application of cryptographic techniques. pp. 83- 104 ,(1992)
Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park, Cryptanalysis of the full HAVAL with 4 and 5 passes fast software encryption. pp. 89- 110 ,(2006) , 10.1007/11799313_7
Mark Needleman, The Internet Engineering Task Force Serials Review. ,vol. 26, pp. 69- 72 ,(2000) , 10.1016/S0098-7913(99)00073-8
Xiaoyun Wang, Hongbo Yu, How to break MD5 and other hash functions theory and application of cryptographic techniques. pp. 19- 35 ,(2005) , 10.1007/11426639_2
Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle, Cryptanalysis of 3-pass HAVAL international conference on the theory and application of cryptology and information security. pp. 228- 245 ,(2003) , 10.1007/978-3-540-40061-5_14
Xiaoyun WANG, An attack on hash function HAVAL-128 Science in China Series F: Information Sciences. ,vol. 48, pp. 545- 556 ,(2005) , 10.1360/122004-107
Martijn Stam, Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions international cryptology conference. ,vol. 5157, pp. 397- 412 ,(2008) , 10.1007/978-3-540-85174-5_22
Silke Holtmanns, Tiina S. Koskinen, Security in communication networks ,(2007)
Jongsung Kim, Bart Preneel, Alex Biryukov, Seokhie Hong, On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 Lecture Notes in Computer Science. ,vol. 4116, pp. 242- 256 ,(2006)
Zhang-yi Wang, Huanguo Zhang, Qingshu Meng, Zhongping Qin, Cryptanalysis of 4-Pass HAVAL. IACR Cryptology ePrint Archive. ,vol. 2006, pp. 161- ,(2006)