Please use this identifier to cite or link to this item:
Title: Cryptanalysis of the LAKE hash family
Authors: Biryukov, Alex
Gauravaram, Praveen
Guo, Jian
Khovratovich, Dmitry
Ling, San
Matusiewicz, Krystian
Nikoli´c, Ivica
Pieprzyk, Josef
Wang, Huaxiong
Keywords: DRNTU::Science::Mathematics
Issue Date: 2009
Source: Biryukov, A., Gauravaram, P., Guo, J., Khovratovich, D., Ling, S., Matusiewicz, K., et al. (2009). Cryptanalysis of the LAKE hash family. Lecture Notes in Computer Science, 5665, 156-179.
Series/Report no.: Lecture notes in computer science
Abstract: We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity 233. The second attack utilizes differences in the chaining values and salt and yields collisions with complexity 242. The final attack uses differences only in the chaining values to yield near-collisions with complexity 299. All our attacks are independent of the number of rounds in the compression function. We illustrate the first two attacks by showing examples of collisions and near-collisions.
DOI: 10.1007/978-3-642-03317-9_10
Rights: © 2009 International Association for Cryptologic Research.This is the author created version of a work that has been peer reviewed and accepted for publication by Lecture Notes in Computer Science, Springer on behalf of International Association for Cryptologic Research. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at:
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SPMS Journal Articles

Files in This Item:
File Description SizeFormat 
Cryptanalysis of the LAKE hash family.pdf674.42 kBAdobe PDFThumbnail

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.