首页> 外文会议>Information security and cryptology-ICISC 2009 >Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash
【24h】

Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash

机译:减少ARIRANG和PKC98-Hash步数的原像攻击

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we present the preimage attacks on step-reduced ARIRANG and PKC98-Hash. Our attacks find the preimages of 35 steps out of 40 steps of ARIRANG and 80 steps out of 96 steps of PKC98-Hash, faster than the brute force attack. We applied recently developed techniques of preimage attack. Our attack for ARIRANG is the improvement of the previous attack, and our attack for PKC98-hash is the first analysis result of its preimage resistance.
机译:在本文中,我们介绍了针对递减的ARIRANG和PKC98-Hash的原像攻击。我们的攻击在ARIRANG的40步中发现了35步的原像,在PKC98-Hash的96步中发现了80步的原像,比蛮力攻击要快。我们应用了最近开发的原像攻击技术。我们对ARIRANG的攻击是对先前攻击的改进,而我们对PKC98哈希的攻击是其对原像抵抗的第一个分析结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号