Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2<sup>254</sup>and 2<sup>125</sup>respecti...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2014-02-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.02.006/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539749159895040 |
---|---|
author | Gao-li WANG Yan-zhao SHEN |
author_facet | Gao-li WANG Yan-zhao SHEN |
author_sort | Gao-li WANG |
collection | DOAJ |
description | The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2<sup>254</sup>and 2<sup>125</sup>respectively. Therefore, the 29-step SM3 hash function is not immune to preimage and pseudo-collision attack. |
format | Article |
id | doaj-art-950151ac678c4b7aa82459e2a7f2843a |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2014-02-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-950151ac678c4b7aa82459e2a7f2843a2025-01-14T06:42:40ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-02-0135404559679347Preimage and pseudo-collision attacks on 29-step SM3 hash function with paddingGao-li WANGYan-zhao SHENThe security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2<sup>254</sup>and 2<sup>125</sup>respectively. Therefore, the 29-step SM3 hash function is not immune to preimage and pseudo-collision attack.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.02.006/hash functionpreimage attackcollision attackmeet-in-the-middle attackSM3 |
spellingShingle | Gao-li WANG Yan-zhao SHEN Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding Tongxin xuebao hash function preimage attack collision attack meet-in-the-middle attack SM3 |
title | Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding |
title_full | Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding |
title_fullStr | Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding |
title_full_unstemmed | Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding |
title_short | Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding |
title_sort | preimage and pseudo collision attacks on 29 step sm3 hash function with padding |
topic | hash function preimage attack collision attack meet-in-the-middle attack SM3 |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.02.006/ |
work_keys_str_mv | AT gaoliwang preimageandpseudocollisionattackson29stepsm3hashfunctionwithpadding AT yanzhaoshen preimageandpseudocollisionattackson29stepsm3hashfunctionwithpadding |