2011
DOI: 10.1007/978-3-642-21702-9_6
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Algebraic Attack on Hamsi-256

Abstract: Abstract. Hamsi is one of the 14 second-stage candidates in NIST's SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version published by Thomas Fuhr at Asiacrypt 2010, which is better than generic attacks only for very short messages of fewer than 100 32-bit blocks, and is only 26 times faster than a straightforward exhaustive search attack. In this paper we describe a different algebraic attack which is less marginal: It is better than the best known … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…However, turning such distinguishers into real attacks, like a key-recovery attack on a cipher or a (second)-preimage attack on a hash function, is a difficult problem. The most promising approach consists in combining some properties of the algebraic normal form of an inner function (e.g., its low degree) and the solving of some algebraic system, as proposed in [3] and [41]. Another open problem is to determine the impact of our result on some stream ciphers which appear to be vulnerable to several attacks exploiting the existence of some function with a low degree [6], [42].…”
Section: Discussionmentioning
confidence: 96%
“…However, turning such distinguishers into real attacks, like a key-recovery attack on a cipher or a (second)-preimage attack on a hash function, is a difficult problem. The most promising approach consists in combining some properties of the algebraic normal form of an inner function (e.g., its low degree) and the solving of some algebraic system, as proposed in [3] and [41]. Another open problem is to determine the impact of our result on some stream ciphers which appear to be vulnerable to several attacks exploiting the existence of some function with a low degree [6], [42].…”
Section: Discussionmentioning
confidence: 96%
“…Non-randomness that might slightly speed-up second-preimage attacks is not excluded by our models and bounds, but we conjecture this to be negligible. To support our conjecture, consider as an example the slight speed-up of second-preimage attacks [DS11,Fuh10] on the SHA-3 candidate Hamsi [Kü09] which uses a very strong non-random property of the compression function. No such strong property seems likely to exist for our proposals.…”
Section: Security Claimsmentioning
confidence: 99%
“…A special feature of this function is that its compression function consists of a small number of rounds of a permutation with a particularly low algebraic degree. These weaknesses have been exploited by Fuhr [12] and by Dinur and Shamir [10] in order to find second preimages for the entire hash function. We show here that Fuhr's attack is related to the (v, w)-linearity of the Sbox used in Hamsi.…”
Section: ⊓ ⊔mentioning
confidence: 99%