首页> 外文会议>Information security practice and experience >Preimage Attack on Hash Function RIPEMD
【24h】

Preimage Attack on Hash Function RIPEMD

机译:对哈希函数RIPEMD的原像攻击

获取原文
获取原文并翻译 | 示例

摘要

RIPEMD is a cryptographic hash function devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation, 1988-1992). It consists of two parallel lines, and each line is identical to MD4 except for some internal constants. It has been broken by the collision attack, but no preimage attack was given. In this paper, we give a preimage attack on the compression function of the 26-step reduced RIPEMD with complexity 2~(110) compression function computations, and we extend the attack on the compression function to an attack on the 26-step reduced RIPEMD with complexity 2~(115.2) instead of 2~(128). Then we extend the attack on 26 steps to the attack on 29 steps with the same complexity. Moreover, we can reduce the complexity of the preimage attack on the full RIPEMD without the padding rule by 1 bit compared with the brute-force attack.
机译:RIPEMD是在RIPE项目的框架(RACE完整性基元评估,1988-1992)中设计的加密哈希函数。它由两条平行线组成,除了某些内部常量外,每条线均与MD4相同。它已被碰撞攻击破坏,但未提供原像攻击。本文通过复杂度2〜(110)压缩函数计算,对26步精简RIPEMD的压缩函数进行原像攻击,并将对压缩函数的攻击扩展为对26步精简RIPEMD的攻击复杂度为2〜(115.2),而不是2〜(128)。然后,我们以相同的复杂度将攻击从26个步骤扩展到29个步骤。此外,与蛮力攻击相比,我们可以将没有填充规则的完整RIPEMD上原图像攻击的复杂性降低1位。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号