Improved boomerang attacks on SM3

  • Dongxia Bai
  • , Hongbo Yu*
  • , Gaoli Wang
  • , Xiaoyun Wang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on the Merkle-Damgård design and is very similar to SHA-2 but includes some additional strengthening features. In this paper, we apply the boomerang attack to SM3 compression function, and present such distinguishers on up to 34/35/36/37 steps out of 64 steps, with time complexities 231.4, 233.6, 273.4 and 293 compression function calls respectively. Especially, we are able to obtain the examples of the distinguishers on 34-step and 35-step on a PC due to their practical complexities. In addition, incompatible problems in the recent boomerang attack are pointed out.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 18th Australasian Conference, ACISP 2013, Proceedings
PublisherSpringer Verlag
Pages251-266
Number of pages16
ISBN (Print)9783642390586
DOIs
StatePublished - 2013
Externally publishedYes
Event18th Australasian Conference on Information Security and Privacy, ACISP 2013 - Brisbane, QLD, Australia
Duration: 1 Jul 20133 Jul 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7959 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th Australasian Conference on Information Security and Privacy, ACISP 2013
Country/TerritoryAustralia
CityBrisbane, QLD
Period1/07/133/07/13

Keywords

  • SM3
  • boomerang attack
  • cryptanalysis
  • hash function

Fingerprint

Dive into the research topics of 'Improved boomerang attacks on SM3'. Together they form a unique fingerprint.

Cite this