Title :
Collision attack on NaSHA-384/512
Author :
Li, Zhimin ; Jiang, Hongan ; Li, Cunhua
Author_Institution :
Sch. of Comput. Eng., Huaihai Inst. of Technol., Lianyungang, China
Abstract :
NaSHA is a family of hash functions submitted by Markovski and Mileva, it is accepted as one of the first SHA-3 round candidates. In this paper, we present a collision attack on NaSHA for the output sizes 384-bit and 512-bit. This attack is based on the the weakness in the generate course of the state words, and the fact that the quasigroup operation used in the compression function are determined by partial state words. The time complexity of this attack is about 2128 with negligible memory. This is currently by far the best known cryptanalysis result on this hash function.
Keywords :
cryptography; Markovski; Mileva; NaSHA-384/512; SHA-3 round candidates; collision attack; cryptanalysis; hash functions; partial state words; quasigroup operation; Authentication; Computer networks; Cryptography; Digital signatures; Information technology; Milling machines; NIST; Security; Collision attack; Hash function; NaSHA; Quasigroup operation;
Conference_Titel :
Networking and Information Technology (ICNIT), 2010 International Conference on
Conference_Location :
Manila
Print_ISBN :
978-1-4244-7579-7
Electronic_ISBN :
978-1-4244-7578-0
DOI :
10.1109/ICNIT.2010.5508519