Attacks on StreamHash 2

نویسنده

  • Mateusz Buczek
چکیده

StreamHash 2 is a hash function proposed by Michał Trojnara at the Cryptography and Security Systems in 2011 Conference. This algorithm is a member of StreamHash family which was first introduced in 2008 during the SHA-3 Competition. In this paper we will show collision attacks on the internal state of the StreamHash 2 hash function with complexity about 2 for the 32n-bit version of the algorithm and its reduced version with complexity 2. We will also show its application to attacking the full StreamHash 2 function (finding a collision on all output bits) with complexity about 2 . We will try to show that any changes made to the construction (for instance the ones proposed for StreamHash 3) will have no effect on the security of the family due to critical fault build into the compression function. 1 StreamHash and the SHA-3 Competition On November 2nd, 2007 the National Institute of Standards and Technology (NIST) announced a hash function competition for a new SHA-3 (Secure Hash Algorithm). The goal of the competition was to replace the older constructions such as SHA-1 and SHA-2 in all their variants with a new, more secure and faster algorithm. Another goal of the competition was to improve knowledge in the field of hash functions and find new attacks and new constructions for hash functions. There were over 50 proposed algorithms and 51 of them were selected for the first round. One of those 51 candidates was StreamHash (now, due to the family development, called StreamHash 1) proposed by Michał Trojnara from Warsaw University of Technology. ∗[email protected] Pobrane z czasopisma Annales AIInformatica http://ai.annales.umcs.pl Data: 29/12/2017 00:03:25

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolution of the StreamHash hash function family

This paper describes the evolution of StreamHash cryptographic hash function family proposed by the author. The first member of the StreamHash family was StreamHash (now called StreamHash1) function, accepted for the first round of SHA-3 competition organized by the US government standards agency NIST. The competition has been started in order to select a new SHA-3 standard as the successor of ...

متن کامل

The Effects of Economic Sanctions and Speculative Attacks on Inflation

This paper surveys the persian monetary crises due to economic sanctions and speculative attacks that leads to high inflation. Economic sanctions are associated with various forms of trade barriers and restriction on financial transactions. Among the most influential sanctions on Iran's oil export and central bank sanctions are noted that their Aims to reduce Iran's oil revenues and Devaluation...

متن کامل

New Fixed Point Attacks on GOST2 Block Cipher

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

متن کامل

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Annales UMCS, Informatica

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2012