Paper 2023/277
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP
Abstract
The hash function RIPEMD-160 is an ISO/IEC standard and is being used to generate the bitcoin address together with SHA-256. Despite the fact that many hash functions in the MD-SHA hash family have been broken, RIPEMD-160 remains secure and the best collision attack could only reach up to 34 out of 80 rounds, which was published at CRYPTO 2019. In this paper, we propose a new collision attack on RIPEMD-160 that can reach up to 36 rounds with time complexity
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- A major revision of an IACR publication in EUROCRYPT 2023
- Keywords
- RIPEMD-160collision attacksigned differencemodular differenceMILP
- Contact author(s)
-
liufukangs @ gmail com
glwang @ sei ecnu edu cn
santanu @ iitm ac in
ravianandsps @ gmail com
willimeier48 @ gmail com
liyx1140 @ 163 com
takanori isobe @ ai u-hyogo ac jp - History
- 2023-02-27: approved
- 2023-02-24: received
- See all versions
- Short URL
- https://ia.cr/2023/277
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2023/277, author = {Fukang Liu and Gaoli Wang and Santanu Sarkar and Ravi Anand and Willi Meier and Yingxin Li and Takanori Isobe}, title = {Analysis of {RIPEMD}-160: New Collision Attacks and Finding Characteristics with {MILP}}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/277}, year = {2023}, url = {https://eprint.iacr.org/2023/277} }