Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
A preimage attack on DHA-256 hash function reduced to 37-round and a pseudo collision attack on the func-tion reduced to 39-round were proposed respectively.Based on the meet-in-the-middle attack,the Biclique technique was used to improve the preimage attack from 35-round to 37-round.A 39-round pseu...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2013-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.06.002/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539832974671872 |
---|---|
author | Jian ZOU Wen-ling WU Shuang WU Le DONG |
author_facet | Jian ZOU Wen-ling WU Shuang WU Le DONG |
author_sort | Jian ZOU |
collection | DOAJ |
description | A preimage attack on DHA-256 hash function reduced to 37-round and a pseudo collision attack on the func-tion reduced to 39-round were proposed respectively.Based on the meet-in-the-middle attack,the Biclique technique was used to improve the preimage attack from 35-round to 37-round.A 39-round pseudo collision was achieved using the Bi-clique technique.Overall,a preimage of DHA-256 was constructed with a complexity of 2<sup>255.5</sup>and a memory of 2<sup>3</sup>.Besides,a pseudo collision of DHA-256 was proposed with a complexity of 2<sup>127.5</sup>.These are the best results of preimage and collision attack on DHA-256 hash function. |
format | Article |
id | doaj-art-b3f6b0626aca4c1d9f570480c98c0ad4 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2013-06-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-b3f6b0626aca4c1d9f570480c98c0ad42025-01-14T06:35:26ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-06-013481559672599Preimage and pseudo collision attacks on round-reduced DHA-256 hash functionJian ZOUWen-ling WUShuang WULe DONGA preimage attack on DHA-256 hash function reduced to 37-round and a pseudo collision attack on the func-tion reduced to 39-round were proposed respectively.Based on the meet-in-the-middle attack,the Biclique technique was used to improve the preimage attack from 35-round to 37-round.A 39-round pseudo collision was achieved using the Bi-clique technique.Overall,a preimage of DHA-256 was constructed with a complexity of 2<sup>255.5</sup>and a memory of 2<sup>3</sup>.Besides,a pseudo collision of DHA-256 was proposed with a complexity of 2<sup>127.5</sup>.These are the best results of preimage and collision attack on DHA-256 hash function.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.06.002/DHA-256 hash functionpreimage attackpseudo collision attackmeet-in-the-middle |
spellingShingle | Jian ZOU Wen-ling WU Shuang WU Le DONG Preimage and pseudo collision attacks on round-reduced DHA-256 hash function Tongxin xuebao DHA-256 hash function preimage attack pseudo collision attack meet-in-the-middle |
title | Preimage and pseudo collision attacks on round-reduced DHA-256 hash function |
title_full | Preimage and pseudo collision attacks on round-reduced DHA-256 hash function |
title_fullStr | Preimage and pseudo collision attacks on round-reduced DHA-256 hash function |
title_full_unstemmed | Preimage and pseudo collision attacks on round-reduced DHA-256 hash function |
title_short | Preimage and pseudo collision attacks on round-reduced DHA-256 hash function |
title_sort | preimage and pseudo collision attacks on round reduced dha 256 hash function |
topic | DHA-256 hash function preimage attack pseudo collision attack meet-in-the-middle |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436X.2013.06.002/ |
work_keys_str_mv | AT jianzou preimageandpseudocollisionattacksonroundreduceddha256hashfunction AT wenlingwu preimageandpseudocollisionattacksonroundreduceddha256hashfunction AT shuangwu preimageandpseudocollisionattacksonroundreduceddha256hashfunction AT ledong preimageandpseudocollisionattacksonroundreduceddha256hashfunction |