Paper 2015/494
Cryptanalysis of the LSH and SHA-V Hash Functions
Yonglin Hao and Hongbo Yu
Abstract
In this paper, we study the security of two hash function families LSH and SHA-V.
We find that the wide-pipe MD structural LSH hash functions do not apply the traditional feeding forward operation.
This structural feature enables us to launch free-start collision and pseudo-preimage attacks on full-round LSH hash functions with negligible complexities.
We think the existence of these attacks is inappropriate for LSH although they does not challenge its overall security levels.
We also evaluate the strength of the LSH round function by launching 14-round boomerang attacks on LSH-512 and LSH-256 hash functions with complexities
Metadata
- Available format(s)
- -- withdrawn --
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- Hash FunctionBoomerang AttackLSHSHA-VMD StructureFeeding Forward
- Contact author(s)
- haoyl14 @ mails tsinghua edu cn
- History
- 2015-06-24: withdrawn
- 2015-05-25: received
- See all versions
- Short URL
- https://ia.cr/2015/494
- License
-
CC BY