Collision Attack on Boole
暂无分享,去创建一个
Boole is a hash function designed by Gregory Rose and was submitted to the NIST Hash competition. It is a stream cipher based hash function which produces digests up to 512 bits. Different variants exist, namely Boole16, Boole32 and Boole64 where the number refers to word size in bits. Boole64 is considered as the official submission. In this paper we demonstrate a collision attack with complexity 265 for the 64-bit variant and 233 for the 32-bit variant. The amount of memory required is negligible. Since the attack on Boole32 is practical, we present an example for a collision.
[1] Joan Daemen,et al. Fast Hashing and Stream Encryption with PANAMA , 1998, FSE.
[2] J. Leasure,et al. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3 , 2007 .
[3] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[4] Philip Hawkes,et al. Design and Primitive Specification for Shannon , 2007, Symmetric Cryptography.
[5] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.