Improved boomerang attacks on round‐reduced SM3 and keyed permutation of BLAKE‐256. Issue 3 (1st May 2015)
- Record Type:
- Journal Article
- Title:
- Improved boomerang attacks on round‐reduced SM3 and keyed permutation of BLAKE‐256. Issue 3 (1st May 2015)
- Main Title:
- Improved boomerang attacks on round‐reduced SM3 and keyed permutation of BLAKE‐256
- Authors:
- Bai, Dongxia
Yu, Hongbo
Wang, Gaoli
Wang, Xiaoyun - Abstract:
- Abstract : In this study, the authors study the security of hash functions SM3 and BLAKE‐256 against boomerang attack. SM3 is designed by Wang et al . and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. BLAKE is one of the five finalists of the NIST SHA‐3 competition submitted by Aumasson et al . For SM3, they present boomerang distinguishers for the compression function reduced to 34/35/36/37 steps out of 64 steps, with time complexities 2 31.4, 2 33.6, 2 73.4 and 2 192, respectively. Then, they show some incompatible problems existed in the previous boomerang attacks on SM3. Meanwhile, they launch boomerang attacks on up to 7‐ and 8‐round keyed permutation of BLAKE‐256, which are the first valid 7‐round and 8‐round boomerangs for BLAKE‐256. Especially, since the author's distinguishers on 34/35‐steps compression function of SM3 and 7‐round keyed permutation of BLAKE‐256 are practical, they are able to obtain boomerang quartets of these attacks. As far as they know, these are the best results against round‐reduced SM3 and BLAKE‐256.
- Is Part Of:
- IET information security. Volume 9:Issue 3(2015)
- Journal:
- IET information security
- Issue:
- Volume 9:Issue 3(2015)
- Issue Display:
- Volume 9, Issue 3 (2015)
- Year:
- 2015
- Volume:
- 9
- Issue:
- 3
- Issue Sort Value:
- 2015-0009-0003-0000
- Page Start:
- 167
- Page End:
- 178
- Publication Date:
- 2015-05-01
- Subjects:
- cryptography
boomerang attack -- round‐reduced SM3 -- BLAKE‐256 -- security -- hash function SM3 -- electronic certification service system -- compression function -- 7‐round keyed permutation
Computer security -- Periodicals
Cryptography -- Periodicals
Computer networks -- Security measures -- Periodicals
Database security -- Periodicals
005.8 - Journal URLs:
- https://ietresearch.onlinelibrary.wiley.com/journal/17518717 ↗
http://digital-library.theiet.org/content/journals/iet-ifs ↗
http://www.ietdl.org/IET-IFS ↗
http://www.theiet.org/ ↗ - DOI:
- 10.1049/iet-ifs.2013.0380 ↗
- Languages:
- English
- ISSNs:
- 1751-8709
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - 4363.252660
British Library DSC - BLDSS-3PM
British Library HMNTS - ELD Digital store - Ingest File:
- 16479.xml