Practical Attacks on AES-like Cryptographic Hash Functions

Stefan Kölbl, Christian Rechberger

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review


Despite the great interest in rebound attacks on AES-like hash functions since 2009, we report on a rather generic, albeit keyschedule-dependent, algorithmic improvement: A new message modification technique to extend the inbound phase, which even for large internal states makes it possible to drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more relevant model. To allow for easy verification, we also provide a source-code for them.
Original languageEnglish
Title of host publicationProgress in Cryptology - LATINCRYPT 2014
Publication date2015
ISBN (Print)978-3-319-16294-2
ISBN (Electronic)978-3-319-16295-9
Publication statusPublished - 2015
Event3rd International Conference on Cryptology and Information Security in Latin America: Latincrypt 2014 - The Costão do Santinho Resort, Florianópolis, Brazil
Duration: 17 Sep 201419 Sep 2014
Conference number: 3


Conference3rd International Conference on Cryptology and Information Security in Latin America
Location The Costão do Santinho Resort
SeriesLecture Notes in Computer Science

Fingerprint Dive into the research topics of 'Practical Attacks on AES-like Cryptographic Hash Functions'. Together they form a unique fingerprint.

Cite this