(Pseudo-) preimage attacks on step-reduced HAS-160 and RIPEMD-160

Gaoli Wang*, Yanzhao Shen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

2 Scopus citations

Abstract

The hash function HAS-160 is standardized by the Korean government and widely used in Korea, and the hash function RIPEMD-160 is a worldwide ISO/IEC standard. In this paper, by careful analysis of the two hash functions, we propose a pseudo-preimage attack on 71-step HAS-160 (no padding) with complexity 2158.13 and a preimage attack on 34-step RIPEMD-160 (with padding) with complexity 2158.91. Both of the attacks are from the first step. The improved results are derived from the differential meet-in-the-middle attack and biclique technique etc. As far as we know, they are the best pseudo-preimage and preimage attacks on step-reduced HAS-160 and RIPEMD-160 respectively in terms of the step number.

Original languageEnglish
Title of host publicationInformation Security - 17th International Conference, ISC 2014, Proceedings
EditorsSherman S.M. Chow, Jan Camenisch, Lucas C.K. Hui, Siu Ming Yiu
PublisherSpringer Verlag
Pages90-103
Number of pages14
ISBN (Electronic)9783319132563
DOIs
StatePublished - 2014
Externally publishedYes

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8783
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • Biclique
  • Differential meet-in-themiddle attack
  • HAS-160
  • Hash function
  • Preimage attack
  • RIPEMD-160

Fingerprint

Dive into the research topics of '(Pseudo-) preimage attacks on step-reduced HAS-160 and RIPEMD-160'. Together they form a unique fingerprint.

Cite this