Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we present the first results on the preimage resistance against step-reduced versions of ISO standard hash functions RIPEMD-128 and RIPEMD-160, which were designed as strengthened versions of RIPEMD. While preimage attacks on the first 33 steps and intermediate 35 steps of RIPEMD (48 steps in total) are known, no preimage attack exists on RIPEMD-128 (64 steps) or RIPEMD-160 (80 steps). This paper shows three variations of preimage attacks of RIPEMD-128; the first 33 steps, intermediate 35 steps, and the last 32 steps. Because of the large security margin, full RIPEMD-128 is still enough secure, however, it is interesting that the number of attacked steps for RIPEMD-128 reaches the same level as for RIPEMD. We also show that our approach can be applied to RIPEMD-160, and present preimage attacks on the first 30 steps and the last 31 steps.
著者
-
Sasaki Yu
Ntt Informating Sharing Platform Laboratories Ntt Corporation
-
SHIMOYAMA Takeshi
FUJITSU LABORATORIES Ltd
-
OHTAHARA Chiaki
Graduate School of Science and Engineering, Informatics, Chuo Laboratories, Chuo University
関連論文
- Extending Bleichenbachers Forgery Attack
- Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
- A Combinatorics Proliferation Model with Threshold for Malware Countermeasure
- Theoretical Analysis of x^2 Attack on RC6 (Symmetric Cipher) (Cryptography and Information Security)
- Preimage Attack on 23-Step Tiger
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- Cryptanalyses of Double-Mix Merkle-Damgard Mode in the Original Version of AURORA-512
- Preimage Attacks against PKC98-Hash and HAS-V
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
- Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
- Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n)
- Extending Bleichenbacher's Forgery Attack
- Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160