Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
Ingenico, France.
EPFL, Switzerland.
FHNW, Switzerland.
Ingenico, France.
2009 (English)In: ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009 / [ed] Matsui, M, 2009, 560-577 p.Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, an improved differential cryptanalysis framework for finding collisions in hash functions is provided. Its principle is based on linearization of compression functions in order to find low weight differential characteristics as initiated by Chabaud and Joux. This is formalized and refined however in several ways: for the problem of finding a conforming message pair whose differential trail follows a linear trail, a condition function is introduced so that finding a collision is equivalent to finding a preimage of the zero vector under the condition function. Then, the dependency table concept shows how much influence every input bit of the condition function has on each output bit. Careful analysis of the dependency table reveals degrees of freedom that can be exploited in accelerated preimage reconstruction under the condition function. These concepts are applied to an in-depth collision analysis of reduced-round versions of the two SHA-3 candidates Cube Hash and MD6, and are demonstrated to give by far the best currently known collision attacks on these SHA-3 candidates.

Place, publisher, year, edition, pages
2009. 560-577 p.
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 5912
Keyword [en]
Hash functions, collisions, differential attack, SHA-3, CubeHash, MD6
National Category
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-70201DOI: 10.1007/978-3-642-10366-7_33ISI: 000278095700033ISBN: 978-3-642-10365-0 (print)OAI: oai:DiVA.org:kth-70201DiVA: diva2:486072
Conference
15th International Conference on the Theory and Application of Cryptology and Information Security. Tokyo, JAPAN. DEC 06-10, 2009
Note
QC 20120220Available from: 2012-01-30 Created: 2012-01-30 Last updated: 2012-02-20Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Khazaei, Shahram
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 32 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf