2003
DOI: 10.1007/978-3-540-40061-5_14
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of 3-Pass HAVAL

Abstract: Abstract. HAVAL is a cryptographic hash function proposed in 1992 by Zheng, Pieprzyk and Seberry. Its has a structure that is quite similar to other well-known hash functions such as MD4 and MD5. The specification of HAVAL includes a security parameter: the number of passes (that is, the number of times that a particular word of the message is used in the computation) can be chosen equal to 3, 4 or 5. In this paper we describe a practical attack that finds collisions for the 3-pass version of HAVAL. This means… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2004
2004
2009
2009

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…We have shown that only about 4 to 64 random selected messages are needed in order to find a collision of MD4, and only about 2 16 random selected messages to for RIPEMD.…”
Section: Resultsmentioning
confidence: 96%
See 1 more Smart Citation
“…We have shown that only about 4 to 64 random selected messages are needed in order to find a collision of MD4, and only about 2 16 random selected messages to for RIPEMD.…”
Section: Resultsmentioning
confidence: 96%
“…At Asiacrypt 2003, B.V. Rompay etc. [16] gave a collision attack on HAVAL-128 with probability 2 −29 . Some very interesting results on hash functions came out simultaneously in Crypto 2004.…”
Section: Introductionmentioning
confidence: 99%
“…While three preimage attacks on MD4 are known [3,5,6], the picture is different for MD5: using a SAT-solver De et al [3] inverted 26 (out of 64) steps of MD5, and no analytical attack is known to date. Idem for HAVAL: while several collision attacks [7,13,20,21] and even a second preimage attack [9] were published, no preimage attack is known. Independent Work.…”
Section: Introductionmentioning
confidence: 99%
“…-Its structure should be resistant against known attacks including Wang et al's attack [1,2,3,4,5,7,8,14,15,16,17,18]. -The performance should be as competitive as that of SHA-256.…”
Section: Introductionmentioning
confidence: 99%