Second Preimage Attack on SHAMATA-512

INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology(2009)

引用 1|浏览0
暂无评分
摘要
We present a second preimage attack on SHAMATA-512, which is a hash function of 512-bit output and one of the first round candidates of the SHA-3 competition. The attack controls several message blocks to fix some variables of internal state and uses a meet-in-the-middle approach to find second preimages. The time complexity is about 2452.7 computations of the step function and the memory complexity is about 2451.4 blocks of 128 bits.
更多
查看译文
关键词
memory complexity,hash function,message block,step function,meet-in-the-middle approach,512-bit output,sha-3 competition,internal state,preimage attack,time complexity,second preimage attack
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要