首页> 外文会议>Information security applications. >Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward
【24h】

Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward

机译:Full-ARIRANG的原像攻击:中间前馈的DM模式分析

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we present preimage attacks on hash function ARIRANG, which is one of the first round candidates in the SHA-3 com petition. Although ARIRANG was not chosen for the second round, the vulnerability as a hash function has not been discovered yet. ARIRANG has an unique design where the feed-forward operation is computed not only after the last step but also in a middle step. In fact, this design prevents previous preimage attacks from breaking full steps. In this pa per, we apply a framework of meet-in-the-middle preimage attacks to ARIRANG. Specifically, we propose a new initial-structure technique optimized for ARIRANG that overcomes the use of the feed-forward to the middle. This enables us to find preimages of full steps ARIRANG-256 and ARIRANG-512 with 2~(254) and 2~(505) compression function operations and 2~6 and 2~(16) amount of memory, respectively. These are the first results breaking the security of ARIRANG as a hash function.
机译:在本文中,我们提出了对散列函数ARIRANG的原像攻击,这是SHA-3竞争中的第一轮候选者之一。尽管第二轮未选择ARIRANG,但尚未发现该漏洞作为哈希函数。 ARIRANG具有独特的设计,不仅在最后一步之后而且还在中间步骤中计算前馈运算。实际上,这种设计可防止以前的原像攻击破坏整个步骤。在本文中,我们将中间相遇前映像攻击框架应用于ARIRANG。具体来说,我们提出了一种针对ARIRANG进行了优化的新的初始结构技术,该技术克服了前馈到中间的使用。这使我们能够找到具有2〜(254)和2〜(505)压缩功能操作以及2〜6和2〜(16)内存量的全步ARIRANG-256和ARIRANG-512的原像。这些是破坏ARIRANG作为哈希函数的安全性的第一个结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号