Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks
In this paper, improved cryptanalyses for the ISO standard hash function Whirlpool are presented with respect to the fundamental security notions. While a subspace distinguisher was presented on full version (10 rounds) of the compression function, its impact to the security of the hash function see...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Online Access: | https://hdl.handle.net/10356/104987 http://hdl.handle.net/10220/16804 http://dx.doi.org/10.1007/978-3-642-34961-4_34 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-104987 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1049872019-12-06T21:44:08Z Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks Sasaki, Yu Wang, Lei Wu, Shuang Wu, Wenling School of Physical and Mathematical Sciences International Conference on the Theory and Application of Cryptology and Information Security (18th : 2012 : Beijing, China) In this paper, improved cryptanalyses for the ISO standard hash function Whirlpool are presented with respect to the fundamental security notions. While a subspace distinguisher was presented on full version (10 rounds) of the compression function, its impact to the security of the hash function seems limited. In this paper, we discuss the (second) preimage and collision attacks for the hash function and the compression function of Whirlpool. Regarding the preimage attack, 6 rounds of the hash function are attacked with 2481 computations while the previous best attack is for 5 rounds with 2481.5 computations. Regarding the collision attack, 8 rounds of the compression function are attacked with 2120 computations, while the previous best attack is for 7 rounds with 2184 computations. To verify the correctness, especially for the rebound attack on the Sbox with an unbalanced Differential Distribution Table (DDT), the attack is partially implemented, and the differences from attacking the Sbox with balanced DDT are reported. 2013-10-24T07:45:58Z 2019-12-06T21:44:08Z 2013-10-24T07:45:58Z 2019-12-06T21:44:08Z 2012 2012 Conference Paper Sasaki Y., Wang L., Wu S., & Wu W. (2012). Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. 18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012, 7658, 562-579. https://hdl.handle.net/10356/104987 http://hdl.handle.net/10220/16804 http://dx.doi.org/10.1007/978-3-642-34961-4_34 en |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
description |
In this paper, improved cryptanalyses for the ISO standard hash function Whirlpool are presented with respect to the fundamental security notions. While a subspace distinguisher was presented on full version (10 rounds) of the compression function, its impact to the security of the hash function seems limited. In this paper, we discuss the (second) preimage and collision attacks for the hash function and the compression function of Whirlpool. Regarding the preimage attack, 6 rounds of the hash function are attacked with 2481 computations while the previous best attack is for 5 rounds with 2481.5 computations. Regarding the collision attack, 8 rounds of the compression function are attacked with 2120 computations, while the previous best attack is for 7 rounds with 2184 computations. To verify the correctness, especially for the rebound attack on the Sbox with an unbalanced Differential Distribution Table (DDT), the attack is partially implemented, and the differences from attacking the Sbox with balanced DDT are reported. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Sasaki, Yu Wang, Lei Wu, Shuang Wu, Wenling |
format |
Conference or Workshop Item |
author |
Sasaki, Yu Wang, Lei Wu, Shuang Wu, Wenling |
spellingShingle |
Sasaki, Yu Wang, Lei Wu, Shuang Wu, Wenling Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks |
author_sort |
Sasaki, Yu |
title |
Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks |
title_short |
Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks |
title_full |
Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks |
title_fullStr |
Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks |
title_full_unstemmed |
Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks |
title_sort |
investigating fundamental security requirements on whirlpool : improved preimage and collision attacks |
publishDate |
2013 |
url |
https://hdl.handle.net/10356/104987 http://hdl.handle.net/10220/16804 http://dx.doi.org/10.1007/978-3-642-34961-4_34 |
_version_ |
1681037112103665664 |