HAVAL is a cryptographic hash function with variable hash value sizes proposed by Zheng, Pieprzyk and Seberry in 1992. It has 3, 4, or 5 passes, and each pass contains 32 steps. There was a collision attack on 5-pass HAVAL, but no second preimage attack. In this paper, we present a second preimage differential path for 5-pass HAVAL with probability 2-227 and exploit it to devise a second preimage attack on 5-pass HAVAL . Furthermore, we utilize the path to recover the partial key of HMAC/NMAC-5-pass HAVAL with 2 235 oracle queries and 235 memory bytes. © 2009 Springer Berlin Heidelberg.
CITATION STYLE
Wang, G., & Wang, S. (2009). Second preimage attack on 5-Pass HAVAL and partial key-recovery attack on HMAC/NMAC-5-Pass HAVAL. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5580 LNCS, pp. 1–13). https://doi.org/10.1007/978-3-642-02384-2_1
Mendeley helps you to discover research relevant for your work.