TY - GEN
T1 - Second preimage attack on 5-Pass HAVAL and partial key-recovery attack on HMAC/NMAC-5-Pass HAVAL
AU - Wang, Gaoli
AU - Wang, Shaohui
PY - 2009
Y1 - 2009
N2 - HAVAL is a cryptographic hash function with variable hash value sizes proposed by Zheng, Pieprzyk and Seberry in 1992. It has 3, 4, or 5 passes, and each pass contains 32 steps. There was a collision attack on 5-pass HAVAL, but no second preimage attack. In this paper, we present a second preimage differential path for 5-pass HAVAL with probability 2-227 and exploit it to devise a second preimage attack on 5-pass HAVAL . Furthermore, we utilize the path to recover the partial key of HMAC/NMAC-5-pass HAVAL with 2 235 oracle queries and 235 memory bytes.
AB - HAVAL is a cryptographic hash function with variable hash value sizes proposed by Zheng, Pieprzyk and Seberry in 1992. It has 3, 4, or 5 passes, and each pass contains 32 steps. There was a collision attack on 5-pass HAVAL, but no second preimage attack. In this paper, we present a second preimage differential path for 5-pass HAVAL with probability 2-227 and exploit it to devise a second preimage attack on 5-pass HAVAL . Furthermore, we utilize the path to recover the partial key of HMAC/NMAC-5-pass HAVAL with 2 235 oracle queries and 235 memory bytes.
KW - HAVAL
KW - HMAC
KW - Key-recovery
KW - NMAC
KW - Second preimage attack
UR - https://www.scopus.com/pages/publications/70350632967
U2 - 10.1007/978-3-642-02384-2_1
DO - 10.1007/978-3-642-02384-2_1
M3 - 会议稿件
AN - SCOPUS:70350632967
SN - 3642023835
SN - 9783642023835
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 13
BT - Progress in Cryptology - AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Proceedings
T2 - 2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009
Y2 - 21 June 2009 through 25 June 2009
ER -