Preimage Attack on ARIRANG
暂无分享,去创建一个
The hash function ARIRANG is one of the 1st round SHA-3 candidates. In this paper, we present preimage attacks on ARIRANG with step-reduced compression functions. We consider two step-reduced variants of the compression function. First one uses the same feedforward1 as the original algorithm, and the other one has the feedforward1 working at the output of the half steps. Our attack finds a preimage of the 33-step OFF(Original FeedForward1)-variants of ARIRANG-256 and ARIRANG-512 from Step 1 to Step 33, and a preimage of the 31-step MFF(Middle FeedForward1)-variants of ARIRANG-256 and ARIRANG512 from Step 3 to Step 33.
[1] Yu Sasaki,et al. A Preimage Attack for 52-Step HAS-160 , 2009, ICISC.
[2] Yu Sasaki,et al. Preimage Attacks on 3, 4, and 5-Pass HAVAL , 2008, ASIACRYPT.
[3] Yu Sasaki,et al. Preimage Attacks on Step-Reduced MD5 , 2008, ACISP.