Paper 2009/407

Single Block Attacks and Statistical Tests on CubeHash

Benjamin Bloom and Alan Kaminsky

Abstract

This paper describes a second preimage attack on the CubeHash cryptographic one-way hash function. The attack finds a second preimage in less time than brute force search for these CubeHash variants: CubeHash $r$/$b$-224 for $b > 100$; CubeHash$r$/$b$-256 for $b > 96$; CubeHash$r$/$b$-384 for $b > 80$; and CubeHash$r$/$b$-512 for $b > 64$. However, the attack does not break the CubeHash variants recommended for SHA-3. The attack requires minimal memory and can be performed in a massively parallel fashion. This paper also describes several statistical randomness tests on CubeHash. The tests were unable to disprove the hypothesis that CubeHash behaves as a random mapping. These results support CubeHash's viability as a secure cryptographic hash function.

Metadata
Available format(s)
PDF PS
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
hash functionsCubeHashcryptanalysisstatistical randomness tests
Contact author(s)
ark @ cs rit edu
History
2009-08-24: received
Short URL
https://ia.cr/2009/407
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2009/407,
      author = {Benjamin Bloom and Alan Kaminsky},
      title = {Single Block Attacks and Statistical Tests on {CubeHash}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2009/407},
      year = {2009},
      url = {https://eprint.iacr.org/2009/407}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.