메뉴 건너뛰기




Volumn 5350 LNCS, Issue , 2008, Pages 253-271

Preimage attacks on 3, 4, and 5-pass HAVAL

Author keywords

Hash function; HAVAL; Local collision; Meet in the middle; One way; Preimage; Splice and cut

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; FUNCTIONS; PROBABILITY DENSITY FUNCTION;

EID: 58349091571     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-89255-7_16     Document Type: Conference Paper
Times cited : (40)

References (18)
  • 1
    • 58349114602 scopus 로고    scopus 로고
    • Aoki, K., Sasaki, Y.: Preimage attacks on one-block MD4, 63-step MD5 and more. In: Avanzi, R., Keliher, L., Sica, F. (eds.) Selected Areas in Cryptography -Workshop Records of 15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, pp. 82-98 (2008)
    • Aoki, K., Sasaki, Y.: Preimage attacks on one-block MD4, 63-step MD5 and more. In: Avanzi, R., Keliher, L., Sica, F. (eds.) Selected Areas in Cryptography -Workshop Records of 15th Annual International Workshop, SAC 2008, Sackville, New Brunswick, Canada, pp. 82-98 (2008)
  • 2
    • 58349108436 scopus 로고    scopus 로고
    • Aumasson, J.-P., Meier, W., Mendel, F.: Preimage attacks on 3-pass HAVAL and step-reduced MD5. In: Avanzi, R., Keliher. L., Sica. F. (eds.) Selected Areas in Cryptography -Workshop Records of 15th Annual International Workshop. SAC 2008. Sackville, New Brunswick, Canada, pp. 99-114 (2008), (also appeared in IACR Cryptology ePrint Archive: Report http://eprint.iacr.org/2008/183)
    • Aumasson, J.-P., Meier, W., Mendel, F.: Preimage attacks on 3-pass HAVAL and step-reduced MD5. In: Avanzi, R., Keliher. L., Sica. F. (eds.) Selected Areas in Cryptography -Workshop Records of 15th Annual International Workshop. SAC 2008. Sackville, New Brunswick, Canada, pp. 99-114 (2008), (also appeared in IACR Cryptology ePrint Archive: Report http://eprint.iacr.org/2008/183)
  • 3
    • 51849105110 scopus 로고    scopus 로고
    • De Cannière, C., Rechberger, C.: Preimages for reduced SHA-O and SHA-1. In: Wagner. D. (ed.) CRYPTO 2008. LNCS. 5157, pp. 179-202. Springer. Heidelberg (2008) (slides on preliminary results were appeared at ESC 2008 seminar, http ://wiki.uni.lu/esc/)
    • De Cannière, C., Rechberger, C.: Preimages for reduced SHA-O and SHA-1. In: Wagner. D. (ed.) CRYPTO 2008. LNCS. vol. 5157, pp. 179-202. Springer. Heidelberg (2008) (slides on preliminary results were appeared at ESC 2008 seminar, http ://wiki.uni.lu/esc/)
  • 4
    • 84947903609 scopus 로고    scopus 로고
    • Dobbertin, H.: The first two rounds of MD4 are not one-way. In: Vaudenay, S. (ed.) FSE 1998. LNCS. 1372, pp. 284-292. Springer, Heidelberg (1998)
    • Dobbertin, H.: The first two rounds of MD4 are not one-way. In: Vaudenay, S. (ed.) FSE 1998. LNCS. vol. 1372, pp. 284-292. Springer, Heidelberg (1998)
  • 5
    • 33750029023 scopus 로고    scopus 로고
    • Kim. J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL. MD4, MD5, SHA-O and SHA-1. In: De Prisco. R., Yung, M. (eds.) SCN 2006. LNCS. 4116. pp. 242-256. Springer, Heidelberg (2006)
    • Kim. J., Biryukov, A., Preneel, B., Hong, S.: On the security of HMAC and NMAC based on HAVAL. MD4, MD5, SHA-O and SHA-1. In: De Prisco. R., Yung, M. (eds.) SCN 2006. LNCS. vol. 4116. pp. 242-256. Springer, Heidelberg (2006)
  • 6
    • 33646736559 scopus 로고    scopus 로고
    • On the security of encryption modes of MD4, MD5 and HAVAL
    • Qing, S, Mao, W, López, J, Wang, G, eds, TCICS 2005, Springer, Heidelberg
    • Kim, J., Biryukov, A., Preneel, B., Lee, S.: On the security of encryption modes of MD4, MD5 and HAVAL. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) TCICS 2005. LNCS, vol. 3783, pp. 147-158. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3783 , pp. 147-158
    • Kim, J.1    Biryukov, A.2    Preneel, B.3    Lee, S.4
  • 7
    • 50249137694 scopus 로고    scopus 로고
    • Lee, E., Kim, J., Chang, D., Sung, J., Hong. S.: Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on NMAC/HMAC-3-pass HAVAL. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086. pp. 189-206. Springer, Heidelberg (2008)
    • Lee, E., Kim, J., Chang, D., Sung, J., Hong. S.: Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on NMAC/HMAC-3-pass HAVAL. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086. pp. 189-206. Springer, Heidelberg (2008)
  • 8
    • 50249175901 scopus 로고    scopus 로고
    • Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, 5086, pp. 412-428. Springer, Heidelberg (2008)
    • Leurent, G.: MD4 is not one-way. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 412-428. Springer, Heidelberg (2008)
  • 11
    • 38149071590 scopus 로고    scopus 로고
    • Suzuki, K., Kurosawa, K.: How to find many collisions of 3-pass HAVAL. In: Miyaji, A., Kikuchi. H., Rannenberg. K. (eds.) IWSEC 2007. LNCS, 4752, pp. 428-443. Springer, Heidelberg (2007) (A preliminary version was appeared in IACR Cryptology ePrint Archive: Report 2007/079, http://eprint.iacr.org/2007/ 079)
    • Suzuki, K., Kurosawa, K.: How to find many collisions of 3-pass HAVAL. In: Miyaji, A., Kikuchi. H., Rannenberg. K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 428-443. Springer, Heidelberg (2007) (A preliminary version was appeared in IACR Cryptology ePrint Archive: Report 2007/079, http://eprint.iacr.org/2007/ 079)
  • 12
    • 0345490612 scopus 로고    scopus 로고
    • Cryptanalysis of 3-pass HAVAL
    • Laih, C-S, ed, ASIACRYPT 2003, Springer, Heidelberg
    • van Roinpay, B., Biryukov, A., Preneel, B., Vandewalle, J.: Cryptanalysis of 3-pass HAVAL. In: Laih, C-S. (ed.) ASIACRYPT 2003. LNCS. vol. 2894. pp. 228-245. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2894 , pp. 228-245
    • van Roinpay, B.1    Biryukov, A.2    Preneel, B.3    Vandewalle, J.4
  • 13
    • 33746362587 scopus 로고    scopus 로고
    • An attack on hash function HAVAL-128
    • Information Sciences
    • Wang, X., Feng. D., Yu, X.: An attack on hash function HAVAL-128. Science in China (Information Sciences) 48(5), 545-556 (2005)
    • (2005) Science in China , vol.48 , Issue.5 , pp. 545-556
    • Wang, X.1    Feng, D.2    Yu, X.3
  • 14
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 15
    • 58349101254 scopus 로고    scopus 로고
    • Wang, Z., Zhang, H., Qin, Z., Meng, Q.: Cryptanalysis of 4-pass HAVAL. IACR Cryptology ePrint Archive: Report 2006/161 (2006), http://eprint.iacr.org/ 2006/161
    • Wang, Z., Zhang, H., Qin, Z., Meng, Q.: Cryptanalysis of 4-pass HAVAL. IACR Cryptology ePrint Archive: Report 2006/161 (2006), http://eprint.iacr.org/ 2006/161
  • 16
    • 23944465520 scopus 로고    scopus 로고
    • Yoshida, H., Biryukov, A., De Cannière, C., Lano, J., Preneel, B.: Non-randomness of the full 4 and 5-pass HAVAL. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 324-336. Springer, Heidelberg (2005)
    • Yoshida, H., Biryukov, A., De Cannière, C., Lano, J., Preneel, B.: Non-randomness of the full 4 and 5-pass HAVAL. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 324-336. Springer, Heidelberg (2005)
  • 17
    • 33746695391 scopus 로고    scopus 로고
    • Yu, H., Wang, X., Yun, A., Park, S.: Cryptanalysis of the full HAVAL with 4 and 5 passes. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, 4047, pp. 89-110. Springer. Heidelberg (2006)
    • Yu, H., Wang, X., Yun, A., Park, S.: Cryptanalysis of the full HAVAL with 4 and 5 passes. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 89-110. Springer. Heidelberg (2006)
  • 18
    • 84985796228 scopus 로고
    • HAVAL -one-way hashing algorithm with variable length of output
    • Zheng, Y, Seberry, J, eds, AUSCRYPT 1992, Springer, Heidelberg
    • Zheng, Y., Pieprzyk, J., Seberry, J.: HAVAL -one-way hashing algorithm with variable length of output. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 83-104. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.718 , pp. 83-104
    • Zheng, Y.1    Pieprzyk, J.2    Seberry, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.