Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks

In this paper, improved cryptanalyses for the ISO standard hash function Whirlpool are presented with respect to the fundamental security notions. While a subspace distinguisher was presented on full version (10 rounds) of the compression function, its impact to the security of the hash function see...

Full description

Saved in:
Bibliographic Details
Main Authors: Sasaki, Yu, Wang, Lei, Wu, Shuang, Wu, Wenling
Other Authors: School of Physical and Mathematical Sciences
Format: Conference or Workshop Item
Language:English
Published: 2013
Online Access:https://hdl.handle.net/10356/104987
http://hdl.handle.net/10220/16804
http://dx.doi.org/10.1007/978-3-642-34961-4_34
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-104987
record_format dspace
spelling sg-ntu-dr.10356-1049872019-12-06T21:44:08Z Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks Sasaki, Yu Wang, Lei Wu, Shuang Wu, Wenling School of Physical and Mathematical Sciences International Conference on the Theory and Application of Cryptology and Information Security (18th : 2012 : Beijing, China) In this paper, improved cryptanalyses for the ISO standard hash function Whirlpool are presented with respect to the fundamental security notions. While a subspace distinguisher was presented on full version (10 rounds) of the compression function, its impact to the security of the hash function seems limited. In this paper, we discuss the (second) preimage and collision attacks for the hash function and the compression function of Whirlpool. Regarding the preimage attack, 6 rounds of the hash function are attacked with 2481 computations while the previous best attack is for 5 rounds with 2481.5 computations. Regarding the collision attack, 8 rounds of the compression function are attacked with 2120 computations, while the previous best attack is for 7 rounds with 2184 computations. To verify the correctness, especially for the rebound attack on the Sbox with an unbalanced Differential Distribution Table (DDT), the attack is partially implemented, and the differences from attacking the Sbox with balanced DDT are reported. 2013-10-24T07:45:58Z 2019-12-06T21:44:08Z 2013-10-24T07:45:58Z 2019-12-06T21:44:08Z 2012 2012 Conference Paper Sasaki Y., Wang L., Wu S., & Wu W. (2012). Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. 18th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2012, 7658, 562-579. https://hdl.handle.net/10356/104987 http://hdl.handle.net/10220/16804 http://dx.doi.org/10.1007/978-3-642-34961-4_34 en
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
description In this paper, improved cryptanalyses for the ISO standard hash function Whirlpool are presented with respect to the fundamental security notions. While a subspace distinguisher was presented on full version (10 rounds) of the compression function, its impact to the security of the hash function seems limited. In this paper, we discuss the (second) preimage and collision attacks for the hash function and the compression function of Whirlpool. Regarding the preimage attack, 6 rounds of the hash function are attacked with 2481 computations while the previous best attack is for 5 rounds with 2481.5 computations. Regarding the collision attack, 8 rounds of the compression function are attacked with 2120 computations, while the previous best attack is for 7 rounds with 2184 computations. To verify the correctness, especially for the rebound attack on the Sbox with an unbalanced Differential Distribution Table (DDT), the attack is partially implemented, and the differences from attacking the Sbox with balanced DDT are reported.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Sasaki, Yu
Wang, Lei
Wu, Shuang
Wu, Wenling
format Conference or Workshop Item
author Sasaki, Yu
Wang, Lei
Wu, Shuang
Wu, Wenling
spellingShingle Sasaki, Yu
Wang, Lei
Wu, Shuang
Wu, Wenling
Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks
author_sort Sasaki, Yu
title Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks
title_short Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks
title_full Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks
title_fullStr Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks
title_full_unstemmed Investigating fundamental security requirements on whirlpool : improved preimage and collision attacks
title_sort investigating fundamental security requirements on whirlpool : improved preimage and collision attacks
publishDate 2013
url https://hdl.handle.net/10356/104987
http://hdl.handle.net/10220/16804
http://dx.doi.org/10.1007/978-3-642-34961-4_34
_version_ 1681037112103665664