Paper 2010/016
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Jian Guo, San Ling, Christian Rechberger, and Huaxiong Wang
Abstract
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks.
Our results are the best known preimage attacks on Tiger, MD4, and reduced SHA-2, with the result on Tiger
being the first cryptanalytic shortcut attack on the full hash function. Our attacks runs in time
Note: An error on the preimage attack against MD4 has been corrected.
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. A short version of the paper will appear in ASIACRYPT 2010
- Keywords
- PreimageMD4TigerSHA-2Hash functionCryptanalysisMeet-in-the-Middle
- Contact author(s)
- ntu guo @ gmail com
- History
- 2010-09-03: last of 7 revisions
- 2010-01-12: received
- See all versions
- Short URL
- https://ia.cr/2010/016
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/016, author = {Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang}, title = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on {MD4} and {SHA}-2}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/016}, year = {2010}, url = {https://eprint.iacr.org/2010/016} }