Reference : Cryptanalysis of the LAKE Hash Family
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/17080
Cryptanalysis of the LAKE Hash Family
English
Biryukov, Alex mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Gauravaram, Praveen [Technical University of Denmark, Denmark]
Guo, Jian [Nanyang Technological University, Singapore]
Khovratovich, Dmitry [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Ling, San [Nanyang Technological University, Singapore]
Matusiewicz, Krystian [Technical University of Denmark, Denmark]
Nikolic, Ivica [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Pieprzyk, Josef [Macquarie University, Australia]
Wang, Huaxiong [Nanyang Technological University, Singapore]
2009
Fast Software Encryption
Springer
156-179
Yes
International
978-3-642-03316-2
Fast Software Encryption
February 22-25, 2009
Leuven
Belgium
[en] We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity 2^{33}. The second attack utilizes differences in the chaining values and salt and yields collisions with complexity 2^{42}. The final attack uses differences only in the chaining values to yield near-collisions with complexity 2^{99}. All our attacks are independent of the number of rounds in the compression function. We illustrate the first two attacks by showing examples of collisions and near-collisions.
http://hdl.handle.net/10993/17080
10.1007/978-3-642-03317-9_10
5665
Fast Software Encryption

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
cryptanalysis-of-Lake.pdfPublisher postprint388.33 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.