Cryptanalysis of Reduced-Round DASH
详细信息    查看全文
  • 作者:Shu-Sheng Liu (1)
    Zheng Gong (1)
    Li-Bin Wang (1)
  • 关键词:hash ; differential analysis ; Boomerang attack ; DASH
  • 刊名:Journal of Computer Science and Technology
  • 出版年:2013
  • 出版时间:January 2013
  • 年:2013
  • 卷:28
  • 期:1
  • 页码:159-164
  • 全文大小:610KB
  • 参考文献:1. Wang X Y, Lai X J, Feng D G, Chen H, Yu X Y. Cryptanalysis of the hash functions MD4 and RIPEMD. In / Proc. the 24th EUROCRYPT 2005, May 2005, pp.1-18.
    2. Wang X Y, Yin Y L, Yu H B. Finding collisions in the full SHA-1. In / Proc. the 25th CRYPTO 2005, August 2005, pp.17-36.
    3. Wang X Y, Yu H B. How to break MD5 and other hash functions. In / Proc. the 24th EUROCRYPT 2005, May 2005, pp.19-35.
    4. Wang X Y, Yu H B, Yin Y L. Efficient collision search attacks on SHA-0. In / Proc. the 25th CRYPTO 2005, August 2005, pp.1-16.
    5. Billet O, Robshaw M J B, Seurin Y, Yin Y L. Looking back at a new hash function. In / Proc. the 13th ACISP 2008, July 2008, pp.239-253.
    6. National Institute of Standards and Technology (NIST). Advanced encryption standard (AES). http://csrc.nist.gov/publications/fips197/fips-197.pdf.
    7. Rivest R L, Robshaw M J B, Sidney R, Yin Y L. The RC6TM block cipher (V1.1), August 20, 1998, www.people.csail.mit.edu/rivest/pubs/RRSY98.pdf.
    8. Wagner D. The Boomerang attack. In / Proc. the 6th FSE, March 1999, pp.156-170.
    9. Biryukov A, Nikolic I, Roy A. Boomerang attacks on BLAKE-32. In / Proc. the 18th FSE, February 2011, pp.218-237.
    10. Lamberger M, Mendel F. Higher-order differential attack on reduced SHA-256. / Cryptology ePrint Archive, Report 2011/037, 2011, http://eprint.iacr.org/2011/037.
  • 作者单位:Shu-Sheng Liu (1)
    Zheng Gong (1)
    Li-Bin Wang (1)

    1. School of Computer Science, South China Normal University, Guangzhou, 510631, China
  • ISSN:1860-4749
文摘
In ACISP 2008, the hash family DASH has been proposed by Billet et al., which considers the design of Rijndael and RC6. DASH family has two variants that support 256-bit and 512-bit output length respectively. This paper presents the first third-party cryptanalysis of DASH-256 with a focus on the underlying block cipher $ {{\mathcal{A}}_{256 }} $ . In particular, we study the distinguisher using differential and boomerang attack. As a result, we build a distinguishing attack for the compression function of DASH-256 with 8-round $ {{\mathcal{A}}_{256 }} $ using the differential cryptanalysis. Finally, we obtain a boomerang distinguisher of 9-round $ {{\mathcal{A}}_{256 }} $ .

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700