In this article, we present an improved collision attack on the hash function proposed by Shin et al. at PKC'98. The attack has a complexity of about 220,5 hash computations, while the previous attack of Chang et al. presented at SAC 2002 has a complexity of about 237.13 hash computations. In the analysis of the hash function we combined existing approaches with recent results in cryptanalysis of hash functions. We show that message-dependent rotations can be exploited to construct collisions. The weak design of the step function facilitates high-probability multi-block collisions. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Mendel, F., Pramstaller, N., & Rechberger, C. (2006). Improved collision attack on the hash function proposed at PKC’98. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4296 LNCS, pp. 8–21). Springer Verlag. https://doi.org/10.1007/11927587_3
Mendeley helps you to discover research relevant for your work.