Second preimage attack on 5-Pass HAVAL and partial key-recovery attack on HMAC/NMAC-5-Pass HAVAL

  • Gaoli Wang*
  • , Shaohui Wang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

HAVAL is a cryptographic hash function with variable hash value sizes proposed by Zheng, Pieprzyk and Seberry in 1992. It has 3, 4, or 5 passes, and each pass contains 32 steps. There was a collision attack on 5-pass HAVAL, but no second preimage attack. In this paper, we present a second preimage differential path for 5-pass HAVAL with probability 2-227 and exploit it to devise a second preimage attack on 5-pass HAVAL . Furthermore, we utilize the path to recover the partial key of HMAC/NMAC-5-pass HAVAL with 2 235 oracle queries and 235 memory bytes.

Original languageEnglish
Title of host publicationProgress in Cryptology - AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Proceedings
Pages1-13
Number of pages13
DOIs
StatePublished - 2009
Externally publishedYes
Event2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009 - Gammarth, Tunisia
Duration: 21 Jun 200925 Jun 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5580 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Cryptology in Africa, AFRICACRYPT 2009
Country/TerritoryTunisia
CityGammarth
Period21/06/0925/06/09

Keywords

  • HAVAL
  • HMAC
  • Key-recovery
  • NMAC
  • Second preimage attack

Fingerprint

Dive into the research topics of 'Second preimage attack on 5-Pass HAVAL and partial key-recovery attack on HMAC/NMAC-5-Pass HAVAL'. Together they form a unique fingerprint.

Cite this