Paper 2015/569

Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)

Bingke Ma, Bao Li, Ronglin Hao, and Xiaoqian Li

Abstract

In this paper, we present improved preimage attacks on the reduced-round \texttt{GOST} hash function family, which serves as the new Russian hash standard, with the aid of techniques such as the rebound attack, the Meet-in-the-Middle preimage attack and the multicollisions. Firstly, the preimage attack on 5-round \texttt{GOST-256} is proposed which is the first preimage attack for \texttt{GOST-256} at the hash function level. Then we extend the (previous) attacks on 5-round \texttt{GOST-256} and 6-round \texttt{GOST-512} to 6.5 and 7.5 rounds respectively by exploiting the involution property of the \texttt{GOST} transposition operation. Secondly, inspired by the preimage attack on \texttt{GOST-256}, we also study the impacts of four representative truncation patterns on the resistance of the Meet-in-the-Middle preimage attack against \texttt{AES}-like compression functions, and propose two stronger truncation patterns which make it more difficult to launch this type of attack. Based on our investigations, we are able to slightly improve the previous pseudo preimage attacks on reduced-round \texttt{Grøstl-256}.

Note: This article is the full version of the paper published at IWSEC 2015.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Major revision. IWSEC 2015
Keywords
hash functioncryptanalysispreimageGOSTGrøstl-256the Meet-in-the-Middle preimage attacktruncation patterns
Contact author(s)
bkma @ is ac cn
History
2015-06-17: received
Short URL
https://ia.cr/2015/569
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/569,
      author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li},
      title = {Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)},
      howpublished = {Cryptology ePrint Archive, Paper 2015/569},
      year = {2015},
      note = {\url{https://eprint.iacr.org/2015/569}},
      url = {https://eprint.iacr.org/2015/569}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.