【24h】

Second Preimage Analysis of Whirlwind

机译:旋风的第二张原像分析

获取原文

摘要

Whirlwind is a keyless AES-like hash function that adopts the Sponge model. According to its designers, the function is designed to resist most of the recent cryptanalytic attacks. In this paper, we evaluate the second preimage resistance of the Whirlwind hash function. More precisely, we apply a meet in the middle preimage attack on the compression function which allows us to obtain a 5-round pseudo preimage for a given compression function output with time complexity of 2~(385) and memory complexity of 2~(128). We also employ a guess and determine approach to extend the attack to 6 rounds with time and memory complexities of 2~(496) and 2~(112), respectively. Finally, by adopting another meet in the middle attack, we are able to generate n-block message second preimages of the 5 and 6-round reduced hash function with time complexity of 2~(449) and 2~(505) and memory complexity of 2~(128) and 2~(112), respectively.
机译:旋风是采用Sponge模型的无密钥类似AES的哈希函数。根据其设计者的说法,该功能旨在抵御最近的大多数密码分析攻击。在本文中,我们评估了旋风哈希函数的第二个像前电阻。更准确地说,我们在中间原像攻击中对压缩函数进行了相遇,这使我们能够为给定的压缩函数输出获得5轮伪原像,其时间复杂度为2〜(385),存储复杂度为2〜(128) )。我们还采用猜测和确定的方法将攻击扩展到6个回合,时间和内存复杂度分别为2〜(496)和2〜(112)。最后,通过在中间攻击中采用另一次相遇,我们能够生成5轮和6轮归约哈希函数的n块消息第二个原像,其时间复杂度为2〜(449)和2〜(505),并且存储复杂度分别为2〜(128)和2〜(112)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号