2009
DOI: 10.1007/978-3-642-05445-7_1
|View full text |Cite
|
Sign up to set email alerts
|

Practical Collisions for SHAMATA-256

Abstract: Abstract. In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function design with components of the AES, and it is one of the fastest submitted hash functions. In our attack, we show weaknesses in the message injection and state update of SHAMATA. It is possible to find certain message differences that do not get changed by the message expansion and non-linear part of the state update function. This allows us to find a differential path with a com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Beyond step 4, if we change the value of W 6 in step 5, we still make the output of step 5 stable by changing the H [4] by a same amount. However this change will be propagated by the right G function in step 1, we can fix this by changing the H [5], H [6] and H [7] by proper values, respectively. This method applies to W 7 in step 5 similarly.…”
Section: Message Adjustmentsmentioning
confidence: 99%
“…Beyond step 4, if we change the value of W 6 in step 5, we still make the output of step 5 stable by changing the H [4] by a same amount. However this change will be propagated by the right G function in step 1, we can fix this by changing the H [5], H [6] and H [7] by proper values, respectively. This method applies to W 7 in step 5 similarly.…”
Section: Message Adjustmentsmentioning
confidence: 99%
“…Google Search (https://www.google.com) still uses MD2 for root certificate. The current best preimage attacks against MD2 are due to Knudsen et al [88] with both time and memory complexity about 2 73 , yet the attacks require more than one message block, which is difficult to be used for forgery. Similar situation happens to the CA certificate using MD5, until the rogue certificate [152] is announced.…”
Section: State Of Artsmentioning
confidence: 99%