Pseudo-cryptanalysis of the Original Blue Midnight Wish

Søren Steffen Thomsen

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organized by the U.S. National Institute of Standards and Technology (NIST). BMW was selected for the second round of the competition, but the algorithm was tweaked in a number of ways. In this paper we describe cryptanalysis on the original version of BMW, as submitted to the SHA-3 competition in October 2008. The attacks described are (near-)collision, preimage and second preimage attacks on the BMW compression function. These attacks can also be described as pseudo-attacks on the full hash function, i.e., as attacks in which the adversary is allowed to choose the initial value of the hash function. The complexities of the attacks are about 2^14 for the near-collision attack, about 2^(3n/8+1) for the pseudo-collision attack, and about 2(3n/4+1) for the pseudo-(second) preimage attack, where n is the output length of the hash function. Memory requirements are negligible. Moreover, the attacks are not (or only moderately) affected by the choice of security parameter for BMW.
    Original languageEnglish
    Title of host publicationFast Software Encryption 2010
    PublisherSpringer
    Publication date2010
    Pages304-317
    ISBN (Print)978-3-642-13857-7
    DOIs
    Publication statusPublished - 2010
    EventFast Software Encryption 2010 - Seoul, Republic of Korea, Korea, Republic of
    Duration: 7 Feb 201010 Feb 2010
    Conference number: 17
    http://www.informatik.uni-trier.de/~ley/db/conf/fse/fse2010.html

    Conference

    ConferenceFast Software Encryption 2010
    Number17
    CountryKorea, Republic of
    CitySeoul, Republic of Korea
    Period07/02/201010/02/2010
    Internet address
    SeriesLecture Notes in Computer Science

    Keywords

    • hash function cryptanalysis - SHA-3 competition - Blue Midnight Wish - pseudo-attacks

    Fingerprint Dive into the research topics of 'Pseudo-cryptanalysis of the Original Blue Midnight Wish'. Together they form a unique fingerprint.

    Cite this