Paper 2013/600
Improved Cryptanalysis of Reduced RIPEMD-160
Florian Mendel, Thomas Peyrin, Martin Schläffer, Lei Wang, and Shuang Wu
Abstract
In this article, we propose an improved cryptanalysis of the double-branch hash function standard RIPEMD-160. Using a carefully designed non-linear path search tool, we study the potential differential paths that can be constructed from a difference in a single message word and show that some of these message words can lead to very good differential path candidates. Leveraging the recent freedom degree utilization technique from Landelle and Peyrin to merge two branch instances, we eventually manage to obtain a semi-free-start collision attack for 42 steps of the RIPEMD-160 compression function, while the previously best know result reached 36 steps. In addition, we also describe a 36-step semi-free-start collision attack which starts from the first step.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- A minor revision of an IACR publication in ASIACRYPT 2013
- Keywords
- RIPEMD-160semi-free-start collisioncompression functionhash function
- Contact author(s)
- thomas peyrin @ gmail com
- History
- 2013-09-19: received
- Short URL
- https://ia.cr/2013/600
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/600, author = {Florian Mendel and Thomas Peyrin and Martin Schläffer and Lei Wang and Shuang Wu}, title = {Improved Cryptanalysis of Reduced {RIPEMD}-160}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/600}, year = {2013}, url = {https://eprint.iacr.org/2013/600} }