Cryptanalysis of Tweaked Versions of SMASH and Reparation

نویسندگان

  • Pierre-Alain Fouque
  • Jacques Stern
  • Sébastien Zimmer
چکیده

In this paper, we study the security of permutation based hash functions, i.e. blockcipher based hash functions with fixed keys. SMASH is such a hash function proposed by Knudsen in 2005 and broken the same year by Pramstaller et al. Here we show that the two tweaked versions, proposed soon after by Knudsen to thwart the attack, can also be attacked in collision in time O(n2). This time complexity can be reduced to O(2 √ ) for the first tweak version, which means an attack against SMASH-256 in c · 2 for a small constant c. Then, we show that an efficient generalization of SMASH, using two permutations instead of one, can be proved secure against collision in the ideal-cipher model in Ω(2) queries to the permutations. In order to analyze the tightness of our proof, we devise a non-trivial attack in O(2) queries. Finally, we also prove that our construction is preimage resistant in Ω(2) queries, which the best security level that can be reached for 2-permutation based hash functions, as proved in [12].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

متن کامل

3D Kinematics Analysis of Overhead Backhand and Forehand Smash Techniques in Badminton

Background. This study aims to analyze the movement of backhand and forehand smash stroke techniques in badminton in three dimensions using a kinematics approach. Objectives. The obtained results were analyzed using a descriptive and quantitative approach. Methods. Furthermore, 24 male badminton players from the university student activity unit with an average age of 19.4 ± 1.6 years, height ...

متن کامل

A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

متن کامل

Effect of Fatigue on Biomechanical Variable Changes in Overhead Badminton Jump Smash

Background. The badminton forehand overhead jump smash is one of the high speed and powerful motions among various racket sports. Objectives. The purpose of this study is to analyze the effect of fatigue on the kinematic variable movement changes during overhead jump smash in badminton. Methods. This study is descriptive quantitative research with the pre-test and post-test design methods use...

متن کامل

Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem

At Eurocrypt 2003, Augot and Finiasz proposed a new public-key encryption scheme based on the polynomial reconstruction problem [1]. The scheme was subsequently broken in [5], who showed that given the public-key and a ciphertext, one could recover the corresponding plaintext in polynomial time. Recently, Augot, Finiasz and Loidreau published on the IACR eprint archive a reparation [2] of the c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008