Second preimage attack on 5-Pass HAVAL and partial key-recovery attack on HMAC/NMAC-5-Pass HAVAL

2Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

HAVAL is a cryptographic hash function with variable hash value sizes proposed by Zheng, Pieprzyk and Seberry in 1992. It has 3, 4, or 5 passes, and each pass contains 32 steps. There was a collision attack on 5-pass HAVAL, but no second preimage attack. In this paper, we present a second preimage differential path for 5-pass HAVAL with probability 2-227 and exploit it to devise a second preimage attack on 5-pass HAVAL . Furthermore, we utilize the path to recover the partial key of HMAC/NMAC-5-pass HAVAL with 2 235 oracle queries and 235 memory bytes. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Wang, G., & Wang, S. (2009). Second preimage attack on 5-Pass HAVAL and partial key-recovery attack on HMAC/NMAC-5-Pass HAVAL. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5580 LNCS, pp. 1–13). https://doi.org/10.1007/978-3-642-02384-2_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free