This paper presents ongoing work toward the first preimage attacks on hash function ARIRANG, which is one of the first round candidates in the SHA-3 competition. ARIRANG has an unique design where the feed-forward operation is computed not only after the last step but also in a middle step. In fact, this design prevents previous preimage attacks. We apply a meet-in-the-middle preimage attacks to ARIRANG. Specifically, we propose a new initial-structure optimized for ARIRANG and overcome the middle feed-forward. © 2011 Springer-Verlag.
CITATION STYLE
Ohtahara, C., Okada, K., Sasaki, Y., & Shimoyama, T. (2011). Preimage attacks on full-ARIRANG (poster). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6812 LNCS, pp. 417–422). https://doi.org/10.1007/978-3-642-22497-3_28
Mendeley helps you to discover research relevant for your work.