In this paper, we give some determinstic differential properties for the compression function of SHA-3 candidate Blue Midnight Wish (tweaked version for round 2). The computational complexity is about 20 compression function calls. This applies to security parameters 0/16, 1/15, and 2/14. The efficient differentials can be used to find pseudo-preimages of the compression function with marginal gain over brute force. However, none of these attacks threaten the security of the BMW hash functions. © 2011 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Guo, J., & Thomsen, S. S. (2011). Deterministic differential properties of the compression function of BMW. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6544 LNCS, pp. 338–350). https://doi.org/10.1007/978-3-642-19574-7_23
Mendeley helps you to discover research relevant for your work.