2014
DOI: 10.1007/978-3-319-06734-6_7
|View full text |Cite
|
Sign up to set email alerts
|

Preimage Attacks on Reduced-Round Stribog

Abstract: Abstract. In August 2012, the Stribog hash function was selected as the new Russian cryptographic hash standard (GOST R 34.11-2012). Stribog employs twelve rounds of an AES-based compression function operating in Miyaguchi-Preneel mode. In this paper, we investigate the preimage resistance of the Stribog hash function. Specifically, we apply a meet in the middle preimage attack on the compression function which allows us to obtain a 5-round pseudo preimage for a given compression function output with time comp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
2

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(24 citation statements)
references
References 18 publications
0
22
0
2
Order By: Relevance
“…It is interesting to mention that because of the versatility of the used differential path where the 1 byte difference can virtually be anywhere in the state, we obtain the freedom to satisfy the magic number as well as other constraints that are needed to produce meaningful collisions for some specific file formats (compare Section 4 in [12]). In other words, as the difference is sparse and the complexity of the attack is upper bounded by 2 20 , if one requires to find two messages that start with a specific byte value, then we need to repeat the first path search 256 times which raises the time complexity of the attack by a factor of 2 8 . As a future direction, one may investigate the applicability of the attack if the number of rounds is not a multiple of four.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…It is interesting to mention that because of the versatility of the used differential path where the 1 byte difference can virtually be anywhere in the state, we obtain the freedom to satisfy the magic number as well as other constraints that are needed to produce meaningful collisions for some specific file formats (compare Section 4 in [12]). In other words, as the difference is sparse and the complexity of the attack is upper bounded by 2 20 , if one requires to find two messages that start with a specific byte value, then we need to repeat the first path search 256 times which raises the time complexity of the attack by a factor of 2 8 . As a future direction, one may investigate the applicability of the attack if the number of rounds is not a multiple of four.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…Since we restrict the input difference of the second path to a specific value, the complexity of the second procedure of our search is increased by a factor of 2 8 . However, the overall search complexity is still dominated by the first procedure which is about 2 20 . Finally, we search for the third and last differential path and its solution which covers rounds 9-12.…”
Section: Our Proposed Technique For Finding Collisions Of the Maliciomentioning
confidence: 99%
See 1 more Smart Citation
“…Since the detailed algorithm of f is not related to our attack, we omit its description in this paper, and refer the interested reader to the original document [20,27]. Yet we would like to point out that f shares high similarity with the compression function of Whirlpool hash function [28], which leads to the analysis results on Streebog [1,2,31] that share similarity with the attacks on Whirlpool [25,29].…”
Section: The Compression Function Of Streebogmentioning
confidence: 99%
“…Stribog [AY14a], and Whirlwind [AY14b]. It is interesting to see that the idea of MITM preimage attacks also leads to the progress of collision attacks against reduced SHA-2 [LIS12].…”
Section: Introductionmentioning
confidence: 99%