Paper 2013/150

Practical (Second) Preimage Attacks on TCS_SHA-3

Gautham Sekar and Soumyadeep Bhattacharya

Abstract

TCS\_SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 2009/0262925). The digest sizes are 224, 256, 384 and 512 bits. The hash functions use bijective functions in place of the standard, compression functions. In this paper we describe first and second preimage attacks on the full hash functions. The second preimage attack requires negligible time and the first preimage attack requires $O(2^{36})$ time. In addition to these attacks, we also present a negligible-time second preimage attack on a strengthened variant of the TCS\_SHA-3. All the attacks have negligible memory requirements.

Note: Revision: Some typographical errors have been corrected.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Cryptanalysishash function(second) preimage attack
Contact author(s)
sgautham @ isichennai res in
History
2013-10-22: last of 4 revisions
2013-03-15: received
See all versions
Short URL
https://ia.cr/2013/150
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/150,
      author = {Gautham Sekar and Soumyadeep Bhattacharya},
      title = {Practical (Second) Preimage Attacks on {TCS_SHA}-3},
      howpublished = {Cryptology {ePrint} Archive, Paper 2013/150},
      year = {2013},
      url = {https://eprint.iacr.org/2013/150}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.