Improved preimage and pseudo-collision attacks on SM3 hash function

A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known best preimage attack on SM3 was only 30-step.Th...

Full description

Saved in:
Bibliographic Details
Main Authors: Jian ZOU, Le DONG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018011/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539450692173824
author Jian ZOU
Le DONG
author_facet Jian ZOU
Le DONG
author_sort Jian ZOU
collection DOAJ
description A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known best preimage attack on SM3 was only 30-step.The 33-step pseudo-collision attack was constructed by using the same techniques.The preimage attack on 32-step SM3 can be computed with a complexity of 2<sup>254.5</sup>,and a memory of 2<sup>5</sup>.Furthermore,The pseudo-preimage and pseudo-collision attacks on 33-step SM3 by extending the differential characteristic of the 32-step preimage attack were present.The pseudo-collision attack on 33-step SM3 can be computed with a complexity of 2<sup>126.7</sup>,and a memory of 2<sup>3</sup>.
format Article
id doaj-art-aa71a995cc3545ee9617dc8d720038d8
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-aa71a995cc3545ee9617dc8d720038d82025-01-14T07:14:05ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-01-0139465559715777Improved preimage and pseudo-collision attacks on SM3 hash functionJian ZOULe DONGA preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known best preimage attack on SM3 was only 30-step.The 33-step pseudo-collision attack was constructed by using the same techniques.The preimage attack on 32-step SM3 can be computed with a complexity of 2<sup>254.5</sup>,and a memory of 2<sup>5</sup>.Furthermore,The pseudo-preimage and pseudo-collision attacks on 33-step SM3 by extending the differential characteristic of the 32-step preimage attack were present.The pseudo-collision attack on 33-step SM3 can be computed with a complexity of 2<sup>126.7</sup>,and a memory of 2<sup>3</sup>.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018011/SM3 hash functionpreimage attackpseudo-collision attackdifferential meet-in-the-middlebiclique
spellingShingle Jian ZOU
Le DONG
Improved preimage and pseudo-collision attacks on SM3 hash function
Tongxin xuebao
SM3 hash function
preimage attack
pseudo-collision attack
differential meet-in-the-middle
biclique
title Improved preimage and pseudo-collision attacks on SM3 hash function
title_full Improved preimage and pseudo-collision attacks on SM3 hash function
title_fullStr Improved preimage and pseudo-collision attacks on SM3 hash function
title_full_unstemmed Improved preimage and pseudo-collision attacks on SM3 hash function
title_short Improved preimage and pseudo-collision attacks on SM3 hash function
title_sort improved preimage and pseudo collision attacks on sm3 hash function
topic SM3 hash function
preimage attack
pseudo-collision attack
differential meet-in-the-middle
biclique
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018011/
work_keys_str_mv AT jianzou improvedpreimageandpseudocollisionattacksonsm3hashfunction
AT ledong improvedpreimageandpseudocollisionattacksonsm3hashfunction