2002
DOI: 10.1007/3-540-45473-x_4
|View full text |Cite
|
Sign up to set email alerts
|

Producing Collisions for PANAMA

Abstract: PANAMA is a cryptographic module that was presented at the FSE Workshop in '98 by Joan Daemen and Craig Clapp. It can serve both as a stream cipher and as a cryptographic hash function, with a hash result of 256 bits. PANAMA achieves high performance (for large amounts of data) because of its inherent parallelism. We will analyse the security of PANAMA when used as a hash function, and demonstrate an attack able to find collisions much faster than by birthday attack. The computational complexity of our current… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2002
2002
2009
2009

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(26 citation statements)
references
References 1 publication
0
26
0
Order By: Relevance
“…The attack is similar to the attack on PANAMA [4,10], since we construct a collision in the internal state during the message injection phase. In this phase, the message input can be used to control the differences in the internal state.…”
Section: Basic Attack Strategymentioning
confidence: 99%
“…The attack is similar to the attack on PANAMA [4,10], since we construct a collision in the internal state during the message injection phase. In this phase, the message input can be used to control the differences in the internal state.…”
Section: Basic Attack Strategymentioning
confidence: 99%
“…This kind of attack improves the statistical attack which tries as many messages as the inverse of the probability of the differential trail. Such an attack has also been mounted on Panama [19,11] and on Grindahl in [18].…”
Section: Related Workmentioning
confidence: 99%
“…In this article, we describe a method to produce collisions for the Panama hash function that refines the method of Rijmen and coworkers [2] and reduces the workload from 2 82 to 2 6 applications of the state updating function. We can therefore generate collisions quasi instantaneously.…”
Section: Introductionmentioning
confidence: 99%
“…3. Like in [2], we use a differential trail (called differential path in [2]) that leads to a zero difference in state and buffer. A differential trail specifies both the message differences and the differences in the state and in the buffer.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation