Internal collision attack on Maraca

Authors Anne Canteaut, Maria Naya-Plasencia



PDF
Thumbnail PDF

File

DagSemProc.09031.8.pdf
  • Filesize: 234 kB
  • 15 pages

Document Identifiers

Author Details

Anne Canteaut
Maria Naya-Plasencia

Cite AsGet BibTex

Anne Canteaut and Maria Naya-Plasencia. Internal collision attack on Maraca. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
https://doi.org/10.4230/DagSemProc.09031.8

Abstract

We present an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition. This attack requires 2^{237} calls to the round function and its complexity is lower than the complexity of the generic collision attack when the length of the message digest is greater than or equal to 512. It is shown that this cryptanalysis mainly exploits some particular differential properties of the inner permutation, which are in some sense in contradiction with the usual security criterion which guarantees the resistance to differential attacks.
Keywords
  • Hash function
  • collision attack
  • differential cryptanalysis
  • Boolean function

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail