通信学报 ›› 2013, Vol. 34 ›› Issue (6): 8-15.doi: 10.3969/j.issn.1000-436X.2013.06.002

• 学术论文 • 上一篇    下一篇

对缩减轮数DHA-256的原像与伪碰撞攻击

邹剑1,2,吴文玲1,吴双1,董乐1,2   

  1. 1 中国科学院 软件研究所 可信计算与信息保障实验室,北京 100190
    2 中国科学院 研究生院,北京 100190
  • 出版日期:2013-06-25 发布日期:2017-07-20
  • 基金资助:
    国家重点基础研究发展计划(“973”计划)基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目

Preimage and pseudo collision attacks on round-reduced DHA-256 hash function

Jian ZOU1,2,Wen-ling WU1,Shuang WU1,Le DONG1,2   

  1. 1 TCA,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China
    2 Graduate University,Chinese Academy of Sciences,Beijing 100190,China
  • Online:2013-06-25 Published:2017-07-20
  • Supported by:
    The National Basic Research Program of China (973 Program);The National Natural Science Foundation of China;The National Natural Science Foundation of China

摘要:

提出了对DHA-256散列函数37轮的原像攻击以及39轮的伪碰撞攻击。基于中间相遇攻击,利用Biclique方法可以改进之前对DHA-256的原像分析结果,将攻击轮数从原来的35轮提高到了37轮。通过上述方法还可以构造对DHA-256的39轮伪碰撞。最终,以2255.5的时间复杂度以及23的空间复杂度构造了对DHA-256的37轮原像,并以2127.5的时间复杂度以及常数2的空间复杂度构造了对DHA-256的39轮伪碰撞。这是目前对DHA-256最好的原像与碰撞攻击结果。

关键词: DHA-256散列函数, 原像攻击, 伪碰撞攻击, 中间相遇攻击

Abstract:

A preimage attack on DHA-256 hash function reduced to 37-round and a pseudo collision attack on the func-tion reduced to 39-round were proposed respectively.Based on the meet-in-the-middle attack,the Biclique technique was used to improve the preimage attack from 35-round to 37-round.A 39-round pseudo collision was achieved using the Bi-clique technique.Overall,a preimage of DHA-256 was constructed with a complexity of 2255.5and a memory of 23.Besides,a pseudo collision of DHA-256 was proposed with a complexity of 2127.5.These are the best results of preimage and collision attack on DHA-256 hash function.

Key words: DHA-256 hash function, preimage attack, pseudo collision attack, meet-in-the-middle

No Suggested Reading articles found!