The usage of counter revisited: Second-preimage attack on new Russian standardized hash function

9Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Streebog is a new Russian hash function standard. It follows the HAIFA framework as domain extension algorithm and claims to resist recent generic second-preimage attacks with long messages. However, we demonstrate in this article that the specific instantiation of the HAIFA framework used in Streebog makes it weak against such attacks. More precisely, we observe that Streebog makes a rather poor usage of the HAIFA counter input in the compression function, which allows to construct second-preimages on the full Streebog-512 with a complexity as low as n × 2n/2(namely 2266) compression function evaluations for long messages. This complexity has to be compared with the expected 2512computations bound that an ideal hash function should provide. Our work is a good example that one must be careful when using a design framework for which not all instances are secure. HAIFA helps designers to build a secure hash function, but one should pay attention to the way the counter is handled inside the compression function.

Cite

CITATION STYLE

APA

Guo, J., Jean, J., Leurent, G., Peyrin, T., & Wang, L. (2014). The usage of counter revisited: Second-preimage attack on new Russian standardized hash function. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8781, pp. 195–211). Springer Verlag. https://doi.org/10.1007/978-3-319-13051-4_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free