2014
DOI: 10.1007/978-3-319-12160-4_11
|View full text |Cite
|
Sign up to set email alerts
|

Rebound Attacks on Stribog

Abstract: Abstract. In August 2012, the Stribog hash function was selected as the new Russian hash standard (GOST R 34.11-2012). Stribog is an AES-based primitive and is considered as an asymmetric reply to the new SHA-3. In this paper we investigate the collision resistance of the Stribog compression function and its internal cipher. Specifically, we present a message differential path for the internal block cipher that allows us to efficiently obtain a 5-round free-start collision and a 7.75 free-start near collision … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
9
0
1

Year Published

2014
2014
2015
2015

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 17 publications
1
9
0
1
Order By: Relevance
“…As for Grøstl-256, a 6-round semi free-start collision is given. Subsequently, rebound attacks have been applied to other AES-based hash functions such as LANE [17], JH [28], Echo [12], Streebog [3], and Grøstl [24]. Various tweaks have been applied to the basic rebound attack in order to construct differential paths that cover more rounds such as merging multiple in-bounds [15], super Sbox cryptanalysis [9], extended 5-round inbound [15], and linearized match-in-themiddle and start-from-the-middle techniques [19].…”
Section: The Rebound Attackmentioning
confidence: 99%
See 4 more Smart Citations
“…As for Grøstl-256, a 6-round semi free-start collision is given. Subsequently, rebound attacks have been applied to other AES-based hash functions such as LANE [17], JH [28], Echo [12], Streebog [3], and Grøstl [24]. Various tweaks have been applied to the basic rebound attack in order to construct differential paths that cover more rounds such as merging multiple in-bounds [15], super Sbox cryptanalysis [9], extended 5-round inbound [15], and linearized match-in-themiddle and start-from-the-middle techniques [19].…”
Section: The Rebound Attackmentioning
confidence: 99%
“…This can be done by performing the following steps: [3,3], shared between the two solutions, one needs to repeat the above procedure 2 8 times. For more details on the specifics of the used technique, the reader is referred to [30].…”
Section: Finding a Solution For The Differential Pathmentioning
confidence: 99%
See 3 more Smart Citations