메뉴 건너뛰기




Volumn 5157 LNCS, Issue , 2008, Pages 162-178

Cryptanalysis of the GOST hash function

Author keywords

Collision attack; Cryptanalysis; Hash function; Preimage attack; Second preimage attack

Indexed keywords

ARSENIC; CHLORINE COMPOUNDS; COMPUTER CRIME; CRYPTOGRAPHY; SECURITY OF DATA; STANDARDS;

EID: 51849136016     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85174-5_10     Document Type: Conference Paper
Times cited : (42)

References (26)
  • 1
    • 51849122735 scopus 로고
    • Systems of the Information Treatment. Cryptographic Security. Algorithms of the Cryptographic Transformation
    • GOST 28147-89, in Russian
    • GOST 28147-89, Systems of the Information Treatment. Cryptographic Security. Algorithms of the Cryptographic Transformation (1989) (in Russian)
    • (1989)
  • 2
    • 51849089951 scopus 로고    scopus 로고
    • GOST 34.10-94, Information Technology Cryptographic Data Security Produce and Check Procedures of Electronic Digital Signature Based on Asymmetric Cryptographic Algorithm (1994) (in Russian)
    • GOST 34.10-94, Information Technology Cryptographic Data Security Produce and Check Procedures of Electronic Digital Signature Based on Asymmetric Cryptographic Algorithm (1994) (in Russian)
  • 3
    • 51849099283 scopus 로고    scopus 로고
    • GOST 34.11-94, Information Technology Cryptographic Data Security Hashing Function (1994) (in Russian)
    • GOST 34.11-94, Information Technology Cryptographic Data Security Hashing Function (1994) (in Russian)
  • 4
    • 84948988609 scopus 로고    scopus 로고
    • Advanced Slide Attacks
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589-606. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 589-606
    • Biryukov, A.1    Wagner, D.2
  • 5
    • 38549144112 scopus 로고    scopus 로고
    • De Cannière, C., Mendel, F., Rechberger, C.: Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. In: Adams, C.M., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, 4876, pp. 56-73. Springer, Heidelberg (2007)
    • De Cannière, C., Mendel, F., Rechberger, C.: Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. In: Adams, C.M., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 56-73. Springer, Heidelberg (2007)
  • 6
    • 38049183978 scopus 로고    scopus 로고
    • Finding SHA-1 Characteristics: General Results and Applications
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • De Cannière, C., Rechberger, C.: Finding SHA-1 Characteristics: General Results and Applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1-20. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 1-20
    • De Cannière, C.1    Rechberger, C.2
  • 7
    • 43149091483 scopus 로고    scopus 로고
    • Gauravaram, P., Kelsey, J.: Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, 4964, pp. 36-51. Springer, Heidelberg (2008)
    • Gauravaram, P., Kelsey, J.: Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 36-51. Springer, Heidelberg (2008)
  • 8
    • 34547434843 scopus 로고    scopus 로고
    • Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction
    • Rhee, M.S, Lee, B, eds, ICISC 2006, Springer, Heidelberg
    • Joscák, D., Tuma, J.: Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 257-266. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4296 , pp. 257-266
    • Joscák, D.1    Tuma, J.2
  • 9
    • 33645780237 scopus 로고    scopus 로고
    • Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
    • Franklin, M.K, ed, CRYPTO 2004, Springer, Heidelberg
    • Joux, A.: Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 306-316. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 306-316
    • Joux, A.1
  • 10
    • 38149010306 scopus 로고    scopus 로고
    • Reflection Attacks on Product Ciphers. Cryptology ePrint Archive
    • Report 2007/043
    • Kara, O.: Reflection Attacks on Product Ciphers. Cryptology ePrint Archive, Report 2007/043 (2007), http://eprint.iacr.org/
    • (2007)
    • Kara, O.1
  • 11
    • 67650338267 scopus 로고    scopus 로고
    • Key-Schedule Cryptoanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptoanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 237-251. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 12
    • 34548114558 scopus 로고    scopus 로고
    • Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive
    • Report 2006/105
    • Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105 (2006), http://eprint.iacr.org/
    • (2006)
    • Klima, V.1
  • 13
    • 38149128144 scopus 로고    scopus 로고
    • Known-Key Distinguishers for Some Block Ciphers
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Knudsen, L.R., Rijmen, V.: Known-Key Distinguishers for Some Block Ciphers. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 315-324. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 315-324
    • Knudsen, L.R.1    Rijmen, V.2
  • 14
    • 35048899747 scopus 로고    scopus 로고
    • Ko, Y., Hong, S., Lee, W., Lee, S., Kang, J.-S.: Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 299-316. Springer, Heidelberg (2004)
    • Ko, Y., Hong, S., Lee, W., Lee, S., Kang, J.-S.: Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 299-316. Springer, Heidelberg (2004)
  • 15
    • 50249150778 scopus 로고    scopus 로고
    • A (Second) Preimage Attack on the GOST Hash Function
    • ed, FSE. LNCS, Springer, Heidelberg
    • Mendel, F., Pramstaller, N., Rechberger, C.: A (Second) Preimage Attack on the GOST Hash Function. In: Nyberg, K. (ed.) FSE. LNCS, vol. 5086, pp. 224-234. Springer, Heidelberg (2008)
    • (2008) Nyberg, K , vol.5086 , pp. 224-234
    • Mendel, F.1    Pramstaller, N.2    Rechberger, C.3
  • 16
    • 38149133737 scopus 로고    scopus 로고
    • Cryptanalysis of the Tiger Hash Function
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Mendel, F., Rijmen, V.: Cryptanalysis of the Tiger Hash Function. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 536-550. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 536-550
    • Mendel, F.1    Rijmen, V.2
  • 17
    • 50049107054 scopus 로고
    • How Easy is Collision Search. New Results and Applications to DES
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Quisquater, J.-J., Delescaille, J.-P.: How Easy is Collision Search. New Results and Applications to DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 408-413. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 408-413
    • Quisquater, J.-J.1    Delescaille, J.-P.2
  • 18
    • 35048855067 scopus 로고    scopus 로고
    • Rogaway, P., Shrimpton, T.: Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 371-388. Springer, Heidelberg (2004)
    • Rogaway, P., Shrimpton, T.: Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. In: Roy, B.K., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371-388. Springer, Heidelberg (2004)
  • 20
    • 84949198848 scopus 로고    scopus 로고
    • Seki, H., Kaneko, T.: Differential Cryptanalysis of Reduced Rounds of GOST. In: Stinson, D.R., Tavares, S.E. (eds.) SAC 2000. LNCS, 2012, pp. 315-323. Springer, Heidelberg (2001)
    • Seki, H., Kaneko, T.: Differential Cryptanalysis of Reduced Rounds of GOST. In: Stinson, D.R., Tavares, S.E. (eds.) SAC 2000. LNCS, vol. 2012, pp. 315-323. Springer, Heidelberg (2001)
  • 21
    • 38049156019 scopus 로고    scopus 로고
    • Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Stevens, M., Lenstra, A.K., de Weger, B.: Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 1-22. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 1-22
    • Stevens, M.1    Lenstra, A.K.2    de Weger, B.3
  • 22
    • 30744432873 scopus 로고    scopus 로고
    • Stinson, D.R.: Some Observations on the Theory of Cryptographic Hash Functions. Des. Codes Cryptography 38(2), 259-277 (2006)
    • Stinson, D.R.: Some Observations on the Theory of Cryptographic Hash Functions. Des. Codes Cryptography 38(2), 259-277 (2006)
  • 23
    • 84937428040 scopus 로고    scopus 로고
    • A Generalized Birthday Problem
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Wagner, D.: A Generalized Birthday Problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288-303. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 288-303
    • Wagner, D.1
  • 24
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the Hash Functions MD4 and RIPEMD
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 25
    • 33745171465 scopus 로고    scopus 로고
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
  • 26
    • 24944591357 scopus 로고    scopus 로고
    • How to Break MD5 and Other Hash Functions
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions.. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.