Cryptanalysis of LASH


Autoria(s): Steinfeld, Ron; Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef; Guo, Jian; Ling, San; Wang, Huaxiong
Data(s)

2008

Resumo

We show that the LASH-x hash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11) and preimage attacks as fast as 2(4x/7). Moreover, we briefly mention heuristic lattice based collision attacks that use small memory but require very long messages that are expected to find collisions much faster than 2 x/2. All of these attacks exploit the designers’ choice of an all zero IV. We then consider whether LASH can be patched simply by changing the IV. In this case, we show that LASH is vulnerable to a 2(7x/8) preimage attack. We also show that LASH is trivially not a PRF when any subset of input bytes is used as a secret key. None of our attacks depend upon the particular contents of the LASH matrix – we only assume that the distribution of elements is more or less uniform.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/69384/

Publicador

Springer Berlin Heidelberg

Relação

http://eprints.qut.edu.au/69384/1/Pieprzyk_authors_draft.pdf

DOI:10.1007/978-3-540-71039-4_13

Steinfeld, Ron, Contini, Scott, Matusiewicz, Krystian, Pieprzyk, Josef, Guo, Jian, Ling, San, & Wang, Huaxiong (2008) Cryptanalysis of LASH. Lecture Notes in Computer Science : Fast Software Encryption, 5086, pp. 207-223.

Direitos

Copyright 2008 Springer-Verlag Berlin Heidelberg

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Palavras-Chave #Cryptanalysis #LASH
Tipo

Journal Article