Cryptanalysis of Tweaked Versions of SMASH and Reparation - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2009

Cryptanalysis of Tweaked Versions of SMASH and Reparation

Résumé

In this paper, we study the security of permutation based hash functions, i.e. block-cipher based hash functions with fixed keys. SMASH is such a hash function presented by Knudsen in 2005 and broken the same year by Rijmen \textit{et al.} Here we show that the tweaked version, proposed soon after to thward the attack can also be attacked in collusion in time $2O(^{n/3})$. This time complexity can be reduced to $O(2^{2\sqrtn})$ for the first tweak version, which means an attack against SMASH-256 in $c\cdot 2^32$ for a small constant $c$. Then, we show that a generalisation of SMASH, using two permutations instead of one, can be proven secure against collision in the ideal-cipher model in $\Omega(2^{n/4})$ queries to the permutations. In order to analyze the tightness of the proof, we devise a non-trivial attack in $O(2^{3n/8})$ queries, which is the best security level that can be reached for 2-permutation based hash functions.
Fichier principal
Vignette du fichier
sac08a.pdf (277.6 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

inria-00556682 , version 1 (17-01-2011)

Identifiants

Citer

Pierre-Alain Fouque, Jacques Stern, Sebastien Zimmer. Cryptanalysis of Tweaked Versions of SMASH and Reparation. Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2009, Sackville, New Brunswick, Canada. pp.136-150, ⟨10.1007/978-3-642-04159-4_9⟩. ⟨inria-00556682⟩
108 Consultations
168 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More