Advanced meet-in-the-middle preimage attacks : first results on full Tiger, and improved results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SHA-2, with the result on Tiger being the first cryptanalytic shortcut attack on the full hash function. Our attacks runs...
Saved in:
Main Authors: | Guo, Jian, Ling, San, Rechberger, Christian, Wang, Huaxiong |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/94168 http://hdl.handle.net/10220/7655 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Improved Meet-in-the-Middle cryptanalysis of KTANTAN (poster)
by: Wei, Lei, et al.
Published: (2012) -
Improved meet-in-the-middle preimage attacks against AES hashing modes
by: Bao, Zhenzhen, et al.
Published: (2020) -
Automatic search of Meet-in-the-Middle preimage attacks on AES-like hashing
by: Bao, Zhenzhen, et al.
Published: (2022) -
Evil twin and man-in-the-middle attack II
by: Loh, Jing Lun.
Published: (2013) -
Practical collision attacks against round-reduced SHA-3
by: Guo, Jian, et al.
Published: (2019)