Abstract
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2254 and 2125 respectively. Therefore, the 29-step SM3 hash function is not immune to preimage and pseudo-collision attack.
| Original language | English |
|---|---|
| Pages (from-to) | 40-45 |
| Number of pages | 6 |
| Journal | Tongxin Xuebao/Journal on Communications |
| Volume | 35 |
| Issue number | 2 |
| DOIs | |
| State | Published - Feb 2014 |
| Externally published | Yes |
Keywords
- Collision attack
- Hash function
- Meet-in-the-middle attack
- Preimage attack
- SM3