Secondly, inspired by the preimage attack on \texttt{GOST-256}, we also study the impacts of four representative truncation patterns on the resistance of the Meet-in-the-Middle preimage attack against \texttt{AES}-like compression functions, and propose two stronger truncation patterns which make it more difficult to launch this type of attack. Based on our investigations, we are able to slightly improve the previous pseudo preimage attacks on reduced-round \texttt{Grøstl-256}.
Category / Keywords: secret-key cryptography / hash function, cryptanalysis, preimage, GOST, Grøstl-256, the Meet-in-the-Middle preimage attack, truncation patterns Original Publication (with major differences): IWSEC 2015 Date: received 9 Jun 2015 Contact author: bkma at is ac cn Available format(s): PDF | BibTeX Citation Note: This article is the full version of the paper published at IWSEC 2015. Version: 20150617:151531 (All versions of this report) Short URL: ia.cr/2015/569 Discussion forum: Show discussion | Start new discussion