首页> 外文会议>Fast software encryption >Meet-in-the-Middle Attacks on SHA-3 Candidates
【24h】

Meet-in-the-Middle Attacks on SHA-3 Candidates

机译:SHA-3候选人的中间相遇攻击

获取原文
获取原文并翻译 | 示例

摘要

We present preimage attacks on the SHA-3 candidates Boole, EnRUPT, Edon-R, and Sarmal, which are found to be vulnerable against a meet-in-the-middle attack. The idea is to invert (or partially invert) the compression function and to exploit its non-randomness. To launch an attack on a large internal state we manipulate the message blocks to be injected in order to fix some part of the internal state and to reduce the complexity of the attack. To lower the memory complexity of the attack we use the memoryless meet-in-the-middle approach proposed by Morita-Ohta-Miyaguchi.
机译:我们对SHA-3候选对象Boole,EnRUPT,Edon-R和Sarmal进行原像攻击,发现它们容易受到中间相遇攻击的攻击。想法是反转(或部分反转)压缩函数并利用其非随机性。为了对较大的内部状态发起攻击,我们操纵要注入的消息块,以修复内部状态的某些部分并降低攻击的复杂性。为了降低攻击的内存复杂性,我们使用了Morita-Ohta-Miyaguchi提出的无记忆中间相遇方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号