The new framework allows to convert preimage attacks into collision attacks and derive the first collision attacks on the reduced SHA-3 finalist Skein in the hash function setting up to 11 rounds. We also demonstrate new preimage attacks on the reduced Skein and the output transformation of the reduced Gr{\o}stl. Finally, the sophisticated technique of message compensation gets a simple explanation with bicliques.
Category / Keywords: Skein, SHA-3, hash function, collision attack, preimage attack, biclique, permutation, Gr{\o}stl Publication Info: submitted Date: received 15 Mar 2012, last revised 1 Jun 2012 Contact author: khovratovich at gmail com Available formats: PDF | BibTeX Citation Note: Description of the method completely revised. Version: 20120601:173222 (All versions of this report) Discussion forum: Show discussion | Start new discussion