Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

  • Gao Li Wang*
  • , Yan Zhao Shen
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2254 and 2125 respectively. Therefore, the 29-step SM3 hash function is not immune to preimage and pseudo-collision attack.

Original languageEnglish
Pages (from-to)40-45
Number of pages6
JournalTongxin Xuebao/Journal on Communications
Volume35
Issue number2
DOIs
StatePublished - Feb 2014
Externally publishedYes

Keywords

  • Collision attack
  • Hash function
  • Meet-in-the-middle attack
  • Preimage attack
  • SM3

Fingerprint

Dive into the research topics of 'Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding'. Together they form a unique fingerprint.

Cite this