首页> 外文会议>International Workshop on Security >Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grostl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions
【24h】

Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grostl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions

机译:改进的(伪)预测对循环的GOST和GRORTL-256的攻击,以及关于AES样压缩函数的几个截断模式的研究

获取原文

摘要

In this paper, we present improved preimage attacks on the reduced-round GOST hash function family, which serves as the new Russian hash standard, with the aid of techniques such as the rebound attack, the Meet-in-the-Middle preimage attack and the multicollisions. Firstly, the preimage attack on 5-round GOST-256 is proposed which is the first preimage attack for GOST-256 at the hash function level. Then we extend the (previous) attacks on 5-round GOST-256 and 6-round GOST-512 to 6.5 and 7.5 rounds respectively by exploiting the involution property of the GOST transposition operation. Secondly, inspired by the preimage attack on GOST-256, we also study the impacts of four representative truncation patterns on the resistance of the Meet-in-the-Middle preimage attack against AES-like compression functions, and propose two stronger truncation patterns which make it more difficult to launch this type of attack. Based on our investigations, we are able to slightly improve the previous pseudo preimage attacks on reduced-round Grostl-256.
机译:在本文中,我们提出了对减速循环式哈希函数家族的预报攻击,它用作新的俄罗斯哈希标准,借助反弹攻击等技术,中间的偏见攻击和多种单位。首先,提出了关于5轮GOST-256上的预测攻击,这是GOST-256在散列函数级别的第一个预测攻击。然后,我们将通过利用GOST转换操作的介入性分别扩展到5轮GOST-256和6轮GOST-512至6.5和7.5轮的攻击。其次,通过对GOST-256的预报攻击的启发,我们还研究了四个代表截断模式对与AES样压缩函数相遇的相遇的抗性的影响,并提出了两个更强的截断模式使这种类型的攻击变得更加困难。根据我们的调查,我们能够略微改善以前的伪血管攻击对倒闭Grostl-256。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号