2011
DOI: 10.1007/978-3-642-19574-7_26
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Luffa v2 Components

Abstract: We develop a number of techniques for the cryptanalysis of the SHA-3 candidate Luffa, and apply them to various Luffa components. These techniques include a new variant of the rebound approach taking into account the specifics of Luffa. The main improvements include the construction of good truncated differential paths, the search for differences using multiple inbound phases and a fast final solution search via linear systems. Using these techniques, we are able to construct nontrivial semi-free-start collisi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(24 citation statements)
references
References 6 publications
0
24
0
Order By: Relevance
“…It should be noted that, by nature, this algebraic property is very different from the properties exploited in previously known distinguishers on the compression function of Luffa v2 (e.g. [9]). …”
Section: Higher-order Differentials For the Compression Function Of Lmentioning
confidence: 70%
“…It should be noted that, by nature, this algebraic property is very different from the properties exploited in previously known distinguishers on the compression function of Luffa v2 (e.g. [9]). …”
Section: Higher-order Differentials For the Compression Function Of Lmentioning
confidence: 70%
“…However, for the case of w different permutations P i this is not immediately clear. We remark that a distinguisher for the permutation of Luffa is derived in [43].…”
Section: 10mentioning
confidence: 99%
“…Future work includes the search for even sparser truncated differential paths and the improvement of the given attacks by using the large degrees of available freedom. Also the separate search for differences and values as proposed in [12] and [8] may be used to improve the complexity of additional inbound phases.…”
Section: Resultsmentioning
confidence: 99%