首页> 外文会议>International Workshop on Fast Software Encryption >Meet-in-the-Middle Attacks on SHA-3 Candidates
【24h】

Meet-in-the-Middle Attacks on SHA-3 Candidates

机译:对SHA-3候选人的中间攻击

获取原文

摘要

We present preimage attacks on the SHA-3 candidates Boole, EnRUPT, Edon-R, and Sarmal, which are found to be vulnerable against a meet-in-the-middle attack. The idea is to invert (or partially invert) the compression function and to exploit its non-randomness. To launch an attack on a large internal state we manipulate the message blocks to be injected in order to fix some part of the internal state and to reduce the complexity of the attack. To lower the memory complexity of the attack we use the memoryless meet-in-the-middle approach proposed by Morita-Ohta-Miyaguchi.
机译:我们向Sha-3候选人的恐惧袭击攻击攻击,恩兴,EDON-R和草药被发现易受中间攻击的群体。这个想法是反转(或部分反转)压缩函数并利用其非随机性。要在大型内部状态启动攻击,我们操纵要注入的消息块以便修复内部状态的某些部分并降低攻击的复杂性。为了降低攻击的内存复杂性,我们使用Morita-Ohta-Miyaguchi提出的无记忆举行的中间方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号