Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2<sup>254</sup>and 2<sup>125</sup>respecti...

Full description

Saved in:
Bibliographic Details
Main Authors: Gao-li WANG, Yan-zhao SHEN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2014-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.02.006/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539749159895040
author Gao-li WANG
Yan-zhao SHEN
author_facet Gao-li WANG
Yan-zhao SHEN
author_sort Gao-li WANG
collection DOAJ
description The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2<sup>254</sup>and 2<sup>125</sup>respectively. Therefore, the 29-step SM3 hash function is not immune to preimage and pseudo-collision attack.
format Article
id doaj-art-950151ac678c4b7aa82459e2a7f2843a
institution Kabale University
issn 1000-436X
language zho
publishDate 2014-02-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-950151ac678c4b7aa82459e2a7f2843a2025-01-14T06:42:40ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2014-02-0135404559679347Preimage and pseudo-collision attacks on 29-step SM3 hash function with paddingGao-li WANGYan-zhao SHENThe security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2<sup>254</sup>and 2<sup>125</sup>respectively. Therefore, the 29-step SM3 hash function is not immune to preimage and pseudo-collision attack.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.02.006/hash functionpreimage attackcollision attackmeet-in-the-middle attackSM3
spellingShingle Gao-li WANG
Yan-zhao SHEN
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
Tongxin xuebao
hash function
preimage attack
collision attack
meet-in-the-middle attack
SM3
title Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
title_full Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
title_fullStr Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
title_full_unstemmed Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
title_short Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
title_sort preimage and pseudo collision attacks on 29 step sm3 hash function with padding
topic hash function
preimage attack
collision attack
meet-in-the-middle attack
SM3
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.02.006/
work_keys_str_mv AT gaoliwang preimageandpseudocollisionattackson29stepsm3hashfunctionwithpadding
AT yanzhaoshen preimageandpseudocollisionattackson29stepsm3hashfunctionwithpadding