2010
DOI: 10.1007/978-3-642-17373-8_2
|View full text |Cite
|
Sign up to set email alerts
|

Finding Second Preimages of Short Messages for Hamsi-256

Abstract: Abstract. In this paper we study the second preimage resistance of Hamsi-256, a second round SHA-3 candidate. We show that it is possible to find affine equations between some input bits and some output bits on the 3-round compression function. This property enables an attacker to find pseudo preimages for the Hamsi-256 compression function. The pseudo preimage algorithm can be used to find second preimages of the digests of messages M with complexity 2 251.3 , which is lower than the best generic attacks when… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
33
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(33 citation statements)
references
References 6 publications
0
33
0
Order By: Relevance
“…While the direct attack seems to be worse than Fuhr's attack [2] , it can be the basis for substantial improvements. In this section we consider the generalized problem of finding a pseudo preimage, defined as a pair of a message block and chaining valueM i ,h i−1 such that F(M i ,h i−1 ) = h * i for a given value h * i .…”
Section: Improving the Direct Attack By Using Pseudo Preimagesmentioning
confidence: 96%
See 4 more Smart Citations
“…While the direct attack seems to be worse than Fuhr's attack [2] , it can be the basis for substantial improvements. In this section we consider the generalized problem of finding a pseudo preimage, defined as a pair of a message block and chaining valueM i ,h i−1 such that F(M i ,h i−1 ) = h * i for a given value h * i .…”
Section: Improving the Direct Attack By Using Pseudo Preimagesmentioning
confidence: 96%
“…Our improved attack exploits the very interesting observations made by Thomas Fuhr in section 3 of [2]. For a given message block M , we select our variables from the state that precedes the first Sbox layer as follows: Let x (j) denote the j th bit of the 32-bit word x.…”
Section: Improving the Direct Attack By Using Pseudo Preimagesmentioning
confidence: 99%
See 3 more Smart Citations