mirage

Cryptanalysis of the LAKE hash family.

DSpace/Manakin Repository

 

Search DR-NTU


Advanced Search Subject Search

Browse

My Account

Cryptanalysis of the LAKE hash family.

Show simple item record

dc.contributor.author Biryukov, Alex.
dc.contributor.author Gauravaram, Praveen.
dc.contributor.author Guo, Jian.
dc.contributor.author Khovratovich, Dmitry.
dc.contributor.author Ling, San.
dc.contributor.author Matusiewicz, Krystian.
dc.contributor.author Nikoli´c, Ivica.
dc.contributor.author Pieprzyk, Josef.
dc.contributor.author Wang, Huaxiong.
dc.date.accessioned 2012-04-11T06:09:44Z
dc.date.available 2012-04-11T06:09:44Z
dc.date.copyright 2009
dc.date.issued 2012-04-11
dc.identifier.citation Biryukov, A., Gauravaram, P., Guo, J., Khovratovich, D., Ling, S., Matusiewicz, K., et al. (2009). Cryptanalysis of the LAKE hash family. Lecture Notes in Computer Science, 5665, 156-179.
dc.identifier.uri http://hdl.handle.net/10220/7722
dc.description.abstract We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity 233. The second attack utilizes differences in the chaining values and salt and yields collisions with complexity 242. The final attack uses differences only in the chaining values to yield near-collisions with complexity 299. All our attacks are independent of the number of rounds in the compression function. We illustrate the first two attacks by showing examples of collisions and near-collisions.
dc.format.extent 24 p.
dc.language.iso en
dc.relation.ispartofseries Lecture notes in computer science
dc.rights © 2009 International Association for Cryptologic Research.This is the author created version of a work that has been peer reviewed and accepted for publication by Lecture Notes in Computer Science, Springer on behalf of International Association for Cryptologic Research. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: http://dx.doi.org/10.1007/978-3-642-03317-9_10
dc.subject DRNTU::Science::Mathematics.
dc.title Cryptanalysis of the LAKE hash family.
dc.type Journal Article
dc.contributor.school School of Physical and Mathematical Sciences
dc.identifier.doi http://dx.doi.org/10.1007/978-3-642-03317-9_10
dc.description.version Accepted version

Files in this item

Files Size Format View
Cryptanalysis of the LAKE hash family.pdf 690.6Kb PDF View/Open

This item appears in the following Collection(s)

Show simple item record

Statistics

Total views

All Items Views
Cryptanalysis of the LAKE hash family. 205

Total downloads

All Bitstreams Views
Cryptanalysis of the LAKE hash family.pdf 98

Top country downloads

Country Code Views
United States of America 34
China 33
Singapore 10
Russian Federation 6
Unknown Country 2

Top city downloads

city Views
Beijing 28
Mountain View 22
Singapore 10
Ogden 4
Redmond 3

Downloads / month

  2014-02 2014-03 2014-04 total
Cryptanalysis of the LAKE hash family.pdf 0 0 2 2