The new framework allows to convert preimage attacks into collision attacks and derive the first collision attacks on the reduced SHA-3 finalist Skein in the hash function setting up to 11 rounds. We also demonstrate new preimage attacks on the reduced Skein and the output transformation of the reduced Grøstl. Finally, the sophisticated technique of message compensation gets a simple explanation with bicliques.
Category / Keywords: Skein, SHA-3, hash function, collision attack, preimage attack, biclique, permutation, Gr{\o}stl Original Publication (with minor differences): IACR-ASIACRYPT-2012 Date: received 15 Mar 2012, last revised 6 Feb 2014 Contact author: khovratovich at gmail com Available format(s): PDF | BibTeX Citation Note: Corrected complexity for the attack on Grostl Version: 20140206:100631 (All versions of this report) Short URL: ia.cr/2012/141