Journal on Communications ›› 2014, Vol. 35 ›› Issue (2): 40-45.doi: 10.3969/j.issn.1000-436x.2014.02.006

• academic paper • Previous Articles     Next Articles

Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

Gao-li WANG,Yan-zhao SHEN   

  1. 1 School of Computer Science and Technology, Donghua University, Shanghai 201620, China;
    2 State Key Laboratory of Information Security , Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Online:2014-02-25 Published:2017-07-25
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Fundamental Research Funds for the Central Universities;The Opening Project of State Key Laboratory of Information Security of Institute of Information Engineer-ing of Chinese Academy of Sciences

Abstract:

The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2254and 2125respectively. Therefore, the 29-step SM3 hash function is not immune to preimage and pseudo-collision attack.

Key words: hash function, preimage attack, collision attack, meet-in-the-middle attack, SM3

No Suggested Reading articles found!