Paper 2015/569
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)
Bingke Ma, Bao Li, Ronglin Hao, and Xiaoqian Li
Abstract
In this paper, we present improved preimage attacks on the reduced-round \texttt{GOST} hash function family, which serves as the new Russian hash standard, with the aid of techniques such as the rebound attack, the Meet-in-the-Middle preimage attack and the multicollisions. Firstly, the preimage attack on 5-round \texttt{GOST-256} is proposed which is the first preimage attack for \texttt{GOST-256} at the hash function level. Then we extend the (previous) attacks on 5-round \texttt{GOST-256} and 6-round \texttt{GOST-512} to 6.5 and 7.5 rounds respectively by exploiting the involution property of the \texttt{GOST} transposition operation. Secondly, inspired by the preimage attack on \texttt{GOST-256}, we also study the impacts of four representative truncation patterns on the resistance of the Meet-in-the-Middle preimage attack against \texttt{AES}-like compression functions, and propose two stronger truncation patterns which make it more difficult to launch this type of attack. Based on our investigations, we are able to slightly improve the previous pseudo preimage attacks on reduced-round \texttt{Grøstl-256}.
Note: This article is the full version of the paper published at IWSEC 2015.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Major revision. IWSEC 2015
- Keywords
- hash functioncryptanalysispreimageGOSTGrøstl-256the Meet-in-the-Middle preimage attacktruncation patterns
- Contact author(s)
- bkma @ is ac cn
- History
- 2015-06-17: received
- Short URL
- https://ia.cr/2015/569
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/569, author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li}, title = {Improved (Pseudo) Preimage Attacks on Reduced-Round {GOST} and Grøstl-256 and Studies on Several Truncation Patterns for {AES}-like Compression Functions (Full Version)}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/569}, year = {2015}, url = {https://eprint.iacr.org/2015/569} }