Abstract:
A class of hash functions with a special finalization round (containing the GOST R 34.11-94 hash function) is considered. For functions from this class we propose a new multicollision attack and show that by means of Wagner's method it is possible to construct a description of a large number of different collisions. For GOST R 34.11-94 hash function we propose a modification of the known collision attack using smaller amount of memory. We obtain lower estimate for the amount of memory permitting the modified attack to be faster than generic ones.
Citation:
D. V. Matyukhin, V. A. Shishkin, “Some methods of hash functions analysis with application to the GOST P 34.11-94 algorithm”, Mat. Vopr. Kriptogr., 3:4 (2012), 71–89
\Bibitem{MatShi12}
\by D.~V.~Matyukhin, V.~A.~Shishkin
\paper Some methods of hash functions analysis with application to the GOST P~34.11-94 algorithm
\jour Mat. Vopr. Kriptogr.
\yr 2012
\vol 3
\issue 4
\pages 71--89
\mathnet{http://mi.mathnet.ru/mvk68}
\crossref{https://doi.org/10.4213/mvk68}
Linking options:
https://www.mathnet.ru/eng/mvk68
https://doi.org/10.4213/mvk68
https://www.mathnet.ru/eng/mvk/v3/i4/p71
This publication is cited in the following 5 articles:
V. V. Gusev, “Legal messages for the GOST R 34.13-2015 block cipher modes”, Mat. Vopr. Kriptogr., 10:3 (2019), 33–47
V. V. Gusev, “Legal messages for some message authentication functions in block ciphers”, Mat. Vopr. Kriptogr., 9:1 (2018), 27–46
A. Abdelkhalek, R. AlTawy, A. M. Youssef, “Impossible differential properties of reduced round Streebog”, Codes, Cryptology, and Information Security, C2Si 2015, Lecture Notes in Computer Science, 9084, eds. ElHajji S., Nitaj A., Carlet C., Souidi E., Springer-Verlag, Berlin, 2015, 274–286
R. AlTawy, A. Kircanski, A. M. Youssef, “Rebound attacks on Stribog”, Information Security and Cryptology - ICISC 2013, Lecture Notes in Computer Science, 8565, 2014, 175–188
R. AlTawy, A. M. Youssef, “Preimage attacks on reduced-round Stribog”, Progress in Cryptology - AFRICACRYPT 2014, Lecture Notes in Computer Science, 8469, 2014, 109–125