Practical Attacks on AES-like Cryptographic Hash Functions

Stefan Kölbl, Christian Rechberger

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

Abstract

Despite the great interest in rebound attacks on AES-like hash functions since 2009, we report on a rather generic, albeit keyschedule-dependent, algorithmic improvement: A new message modification technique to extend the inbound phase, which even for large internal states makes it possible to drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more relevant model. To allow for easy verification, we also provide a source-code for them.
Original languageEnglish
Title of host publicationProgress in Cryptology - LATINCRYPT 2014
Volume8895
PublisherSpringer
Publication date2015
Pages259-273
ISBN (Print)978-3-319-16294-2
ISBN (Electronic)978-3-319-16295-9
DOIs
Publication statusPublished - 2015
Event3rd International Conference on Cryptology and Information Security in Latin America: Latincrypt 2014 - The Costão do Santinho Resort, Florianópolis, Brazil
Duration: 17 Sep 201419 Sep 2014
Conference number: 3

Conference

Conference3rd International Conference on Cryptology and Information Security in Latin America
Number3
Location The Costão do Santinho Resort
CountryBrazil
CityFlorianópolis
Period17/09/201419/09/2014
SeriesLecture Notes in Computer Science
ISSN0302-9743

Fingerprint Dive into the research topics of 'Practical Attacks on AES-like Cryptographic Hash Functions'. Together they form a unique fingerprint.

Cite this