...
首页> 外文期刊>Journal of information science and engineering >Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function
【24h】

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function

机译:舍入减少的Grostl哈希函数的改进的(伪)前映像攻击和第二前映像攻击

获取原文
获取原文并翻译 | 示例
           

摘要

The Grostl hash function is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this paper, we propose some improved (pseudo) preimage attacks on the Grostl hash function by using some techniques, such as subspace preimage attack and the guess-and-determine technique. We present the improved pseudo preimage attacks on 5-round Grostl-256 hash function and 8-round Grostl-512 hash function, and the complexities of these attacks are (2~(239.90), 2~(240.40)) (in time and memory) and (2~(199.50), 2~(499)), respectively. We also extend the pseudo preimage from 5 rounds to 6 rounds for Grostl-256 hash function, besides the biclique attack. Furthermore, we propose the pseudo second preimage attack on 6-round Grostl-256 hash function. The complexities of our 6-round (pseudo) preimage and second preimage attacks are (2~(253.26), 2~(253.67)) and (2~(251.0), 2~(252.0)), respectively. As far as we know, these are the best known preimage attacks on round-reduced Grostl hash function.
机译:Grostl哈希函数是NIST举办的第三轮SHA-3竞赛的五个决赛入围者之一。在本文中,我们通过使用一些技术,例如子空间原像攻击和猜测确定技术,对Grostl哈希函数提出了一些改进的(伪)原像攻击。我们针对5轮Grostl-256哈希函数和8轮Grostl-512哈希函数提出了改进的伪原像攻击,这些攻击的复杂度为(2〜(239.90),2〜(240.40))(及时记忆)和(2〜(199.50),2〜(499))。除了Biclique攻击外,我们还将Grostl-256哈希函数的伪原像从5轮扩展到6轮。此外,我们提出了对6轮Grostl-256哈希函数的伪第二原像攻击。我们的6轮(伪)前映像攻击和第二前映像攻击的复杂度分别为(2〜(253.26),2〜(253.67))和(2〜(251.0),2〜(252.0))。据我们所知,这是对舍入减少的Grostl哈希函数的最著名的原像攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号