Second Preimage Analysis of Whirlwind

被引:6
|
作者
AlTawy, Riham [1 ]
Youssef, Amr M. [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
来源
INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014) | 2015年 / 8957卷
关键词
Cryptanalysis; Hash functions; Meet in the middle; Second preimage attack; Whirlwind; ATTACKS; MD4; WHIRLPOOL;
D O I
10.1007/978-3-319-16745-9_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Whirlwind is a keyless AES-like hash function that adopts the Sponge model. According to its designers, the function is designed to resist most of the recent cryptanalytic attacks. In this paper, we evaluate the second preimage resistance of the Whirlwind hash function. More precisely, we apply a meet in the middle preimage attack on the compression function which allows us to obtain a 5-round pseudo preimage for a given compression function output with time complexity of 2(385) and memory complexity of 2(128). We also employ a guess and determine approach to extend the attack to 6 rounds with time and memory complexities of 2(496) and 2(112), respectively. Finally, by adopting another meet in the middle attack, we are able to generate n-block message second preimages of the 5 and 6-round reduced hash function with time complexity of 2(449) and 2(505) and memory complexity of 2(128) and 2(112), respectively.
引用
收藏
页码:311 / 328
页数:18
相关论文
共 50 条
  • [41] Distinguishing Attack and Second-Preimage Attack on Encrypted Message Authentication Codes (EMAC)
    Ariwibowo, Sigit
    Windarta, Susila
    PROCEEDINGS OF THE 7TH SEAMS UGM INTERNATIONAL CONFERENCE ON MATHEMATICS AND ITS APPLICATIONS 2015: ENHANCING THE ROLE OF MATHEMATICS IN INTERDISCIPLINARY RESEARCH, 2016, 1707
  • [42] WHIRLWIND
    Sollers, Philippe
    INFINI, 2017, (141): : 3 - 16
  • [43] Whirlwind
    Sanders, Irwin T.
    JOURNAL OF POLITICS, 1950, 12 (03): : 572 - 574
  • [44] 'WHIRLWIND'
    NAGAYAMA, M
    MUNDUS ARTIUM, 1976, 9 (01): : 14 - 14
  • [45] Second Preimage Attack on a Chaos-Based Hash Function Construction and Its Improvement
    Hajibabaei, Zahra
    Dakhilalian, Mohammad
    CHAOS AND COMPLEX SYSTEMS, 2013, : 131 - 140
  • [46] Distinguishing Attack and Second Preimage Attack on Mini-AES CBC-MAC
    Wulamarisman, Cahyo Ramdhani
    Windarta, Susila
    2014 International Conference of Advanced Informatics: Concept, Theory and Application (ICAICTA), 2014, : 326 - 331
  • [47] The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function
    Guo, Jian
    Jean, Jeremy
    Leurent, Gaetan
    Peyrin, Thomas
    Wang, Lei
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 195 - 211
  • [48] Stopping the whirlwind
    Klein, JP
    WORLD TODAY, 1999, 55 (06): : 7 - 9
  • [49] Numerical simulation and characteristic analysis of novel whirlwind supercharger
    Zhou H.
    Bai D.
    Yang L.
    Jixie Gongcheng Xuebao/Journal of Mechanical Engineering, 2010, 46 (24): : 118 - 122
  • [50] Second Preimage Attack Method on Various MAC Constructions and Its Application with AES-128
    Sihite, Alfonso Brolin
    Susanti, Bety Hayat
    2016 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE), 2016, : 37 - 42