期刊文献+

Cryptanalysis of Reduced-Round DASH

Cryptanalysis of Reduced-Round DASH
原文传递
导出
摘要 In ACISP 2008, the hash family DASH has been proposed by Billet et al., which considers the design of Rijndael and RC6. DASH family has two variants that support 256-bit and 512-bit output length respectively. This paper presents the first third-party cryptanalysis of DASH-256 with a focus on the underlying block cipher A256. In particular, we study the distinguisher using differential and boomerang attack. As a result, we build a distinguishing attack for the compression function of DASH-256 with 8-round A256 using the differential cryptanalysis. Finally, we obtain a boomerang distinguisher of 9-round A256. In ACISP 2008, the hash family DASH has been proposed by Billet et al., which considers the design of Rijndael and RC6. DASH family has two variants that support 256-bit and 512-bit output length respectively. This paper presents the first third-party cryptanalysis of DASH-256 with a focus on the underlying block cipher A256. In particular, we study the distinguisher using differential and boomerang attack. As a result, we build a distinguishing attack for the compression function of DASH-256 with 8-round A256 using the differential cryptanalysis. Finally, we obtain a boomerang distinguisher of 9-round A256.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第1期159-164,共6页 计算机科学技术学报(英文版)
基金 supported by the National Natural Sciences Foundation of China under Grant No.61100201 Foundation for Distinguished Young Talents in Higher Education of Guangdong Province of China under Grant No.LYM11053
关键词 HASH differential analysis Boomerang attack DASH hash, differential analysis, Boomerang attack, DASH
  • 相关文献

参考文献10

  • 1Wang X Y, Lai X J, Feng D G, Chen H, Yu X Y. Cryptanal- ysis of the hash functions MD4 and RIPEMD. In Proc. the 2:th EUROCRYPT 2005, May 2005, pp.l-18.
  • 2Wang X Y, Yin Y L, Yu H B. Finding collisions in the fullSHA-1. In Proc. the 25th CRYPTO 2005, August 2005, pp.17-36.
  • 3I. Wang X Y, Yu H B. How to break MD5 :nd other hash func- tions. In Proc. the 24th EUROCRYPT 2005, May 2005, pp.19-35.
  • 4Wang X Y, Yu H B, Yin Y L. Efficient coi[lision search attacks on SHA-0. In Proc. the 25th CRYPTO 2005, August 2005, pp.1-16.
  • 5Billet O, Robshaw M J B, Seurin Y, Yin Y L. Looking back at a new hash function. In Proc. the 13ttz ACISP 2008, July 2008, pp.239-253.
  • 6National Institute of Standards and Technol- ogy (NIST). Advanced encryption standard (AES). http://csrc.nist.gov/publications/fips197/fips-197.pdf.
  • 7Rivest R L, Robshaw M J B, Sidney R, Yin Y L. The RC6TM block cipher (VI.1), August 20, 1998, www.DeoDle.csail.mit.edu/rivest/Dubs/RRSY98.Ddf.
  • 8Wagner I). The Boomerang att'ack, in Proc. the 6th FSE, March 1999, pp.156-170.
  • 9Biryukov A, Nikolic I, Roy A. Boomerang attacks on BLAKE- 32. In Proc. the 18th FSE, February 2011, pp.218-237.
  • 10Lamberger M, Mendel F. Higher-order differential attack on reduced SHA-256. Cryptology ePrint Archive, Report 2011/037, 2011, http://eprint.iacr.org/2011/037.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部