Cryptanalysis of the LAKE hash family

DSpace/Manakin Repository


Search DR-NTU

Advanced Search Subject Search


My Account

Cryptanalysis of the LAKE hash family

Show simple item record

dc.contributor.author Biryukov, Alex
dc.contributor.author Gauravaram, Praveen
dc.contributor.author Guo, Jian
dc.contributor.author Khovratovich, Dmitry
dc.contributor.author Ling, San
dc.contributor.author Matusiewicz, Krystian
dc.contributor.author Nikoli´c, Ivica
dc.contributor.author Pieprzyk, Josef
dc.contributor.author Wang, Huaxiong
dc.date.accessioned 2012-04-11T06:09:44Z
dc.date.available 2012-04-11T06:09:44Z
dc.date.copyright 2009
dc.date.issued 2012-04-11
dc.identifier.citation Biryukov, A., Gauravaram, P., Guo, J., Khovratovich, D., Ling, S., Matusiewicz, K., et al. (2009). Cryptanalysis of the LAKE hash family. Lecture Notes in Computer Science, 5665, 156-179.
dc.identifier.uri http://hdl.handle.net/10220/7722
dc.description.abstract We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity 233. The second attack utilizes differences in the chaining values and salt and yields collisions with complexity 242. The final attack uses differences only in the chaining values to yield near-collisions with complexity 299. All our attacks are independent of the number of rounds in the compression function. We illustrate the first two attacks by showing examples of collisions and near-collisions.
dc.format.extent 24 p.
dc.language.iso en
dc.relation.ispartofseries Lecture notes in computer science
dc.rights © 2009 International Association for Cryptologic Research.This is the author created version of a work that has been peer reviewed and accepted for publication by Lecture Notes in Computer Science, Springer on behalf of International Association for Cryptologic Research. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: http://dx.doi.org/10.1007/978-3-642-03317-9_10
dc.subject DRNTU::Science::Mathematics
dc.title Cryptanalysis of the LAKE hash family
dc.type Journal Article
dc.contributor.school School of Physical and Mathematical Sciences
dc.identifier.doi http://dx.doi.org/10.1007/978-3-642-03317-9_10
dc.description.version Accepted version

Files in this item

Files Size Format View
Cryptanalysis of the LAKE hash family.pdf 690.6Kb PDF View/Open

This item appears in the following Collection(s)

Show simple item record


Total views

All Items Views
Cryptanalysis of the LAKE hash family 363

Total downloads

All Bitstreams Views
Cryptanalysis of the LAKE hash family.pdf 215

Top country downloads

Country Code Views
China 107
United States of America 63
Singapore 10
Russian Federation 9
France 3

Top city downloads

city Views
Beijing 53
Mountain View 31
Singapore 10
Ogden 4
Sunnyvale 4

Downloads / month

  2015-08 2015-09 2015-10 total
Cryptanalysis of the LAKE hash family.pdf 0 0 5 5