2011
DOI: 10.1007/978-3-642-21702-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function

Abstract: Abstract. In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to four rounds in 2 52 operations on AES-columns without significant memory requirements. Our attack uses the most recent analyses on ECHO, in particular the SuperSBox and SuperMixColumns layers to utilize efficiently the available freedom degrees. We also show why some of these results are flawed and we propose a solution to fix… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 12 publications
(20 citation statements)
references
References 17 publications
0
20
0
Order By: Relevance
“…Subsequently, rebound attacks have been applied to other AES-based hash functions such as LANE [8], JH [14], and Echo [5]. Various tweaks have been applied to the basic rebound attack in order to construct differential paths that cover more rounds such as merging multiple in-bounds [7], super Sbox cryptanalysis [4], extended 5-round inbound [7], and linearized match-in-the-middle and start-fromthe-middle techniques [10].…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, rebound attacks have been applied to other AES-based hash functions such as LANE [8], JH [14], and Echo [5]. Various tweaks have been applied to the basic rebound attack in order to construct differential paths that cover more rounds such as merging multiple in-bounds [7], super Sbox cryptanalysis [4], extended 5-round inbound [7], and linearized match-in-the-middle and start-fromthe-middle techniques [10].…”
Section: Introductionmentioning
confidence: 99%
“…As for Grøstl-256, a 6-round semi free-start collision is given. Subsequently, rebound attacks have been applied to other AES-based hash functions such as LANE [17], JH [28], Echo [12], Streebog [3], and Grøstl [24]. Various tweaks have been applied to the basic rebound attack in order to construct differential paths that cover more rounds such as merging multiple in-bounds [15], super Sbox cryptanalysis [9], extended 5-round inbound [15], and linearized match-in-themiddle and start-from-the-middle techniques [19].…”
Section: The Rebound Attackmentioning
confidence: 99%
“…With this technique, already proven to be efficient for AES-based hash functions cryptanalysis [10,12,16,17,23] In this model, all AddRoundConstant and SubBytes layers can be ignored since they have no impact on truncated differences. ShiftBytes will only move the difference positions and the diffusion will come from the MixCells layers.…”
Section: Truncated Differential Characteristicsmentioning
confidence: 99%