DocumentCode :
809042
Title :
Analysis of the Hash Function Design Strategy Called SMASH
Author :
Lamberger, Mario ; Pramstaller, Norbert ; Rechberger, Christian ; Rijmen, Vincent
Author_Institution :
Inst. of Appl. Inf. Process. & Commun., Graz Univ. of Technol., Graz
Volume :
54
Issue :
8
fYear :
2008
Firstpage :
3647
Lastpage :
3655
Abstract :
The hash function design strategy SMASH was recently proposed as an alternative to the MD4 family of hash functions. It can be shown that the strategy leads to designs that are vulnerable to efficient collision and (second) preimage attacks. The mathematical structure of the SMASH description facilitates the description of the weakness and the resulting attacks, but also functions with less mathematical elegance may show similar weaknesses.
Keywords :
cryptography; SMASH function; hash function design strategy; preimage attack; Cryptography; Electronic government; Information processing; NIST; Protection; Security; (second) preimages; Collisions; cryptanalysis; cryptography; hash functions;
fLanguage :
English
Journal_Title :
Information Theory, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9448
Type :
jour
DOI :
10.1109/TIT.2008.926420
Filename :
4567582
Link To Document :
بازگشت