Cryptanalyses of Double-Mix Merkle-Damgard Mode in the Original Version of AURORA-512
スポンサーリンク
概要
- 論文の詳細を見る
We present cryptanalyses of the original version of AURORA-512 hash function, which is a round-1 SHA-3 candidate. Our attack exploits weaknesses in a narrow-pipe mode of operation of AURORA-512 named “Double-Mix Merkle-Damgård (DMMD).” The current best collision attack proposed by Joux and Lucks only gives rough complexity estimations. We first evaluate its precise complexity and show its optimization. Secondly, we point out that the current best second-preimage attack proposed by Ferguson and Lucks does not work with the claimed complexity of 2291. We then evaluate a complexity so that the attack can work with a high success probability. We also show that the second-preimage attack can be used to attack the randomized hashing scheme. Finally, we present a key-recovery attack on HMAC-AURORA-512, which reveals 512-bit secret keys with 2257 queries, 2259 AURORA-512 operations, and negligible memory. The universal forgery on HMAC-AURORA-384 is also possible by combining the second-preimage and inner-key-recovery attacks.
- (社)電子情報通信学会の論文
- 2011-01-01
著者
-
Sasaki Yu
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Sasaki Yu
Ntt Informating Sharing Platform Laboratories Ntt Corporation
関連論文
- Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- Preimage Attack on 23-Step Tiger
- Cryptanalyses of Double-Mix Merkle-Damgard Mode in the Original Version of AURORA-512
- Preimage Attacks against PKC98-Hash and HAS-V
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
- Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160