Internal collision attack on Maraca

Authors Anne Canteaut, Maria Naya-Plasencia



PDF
Thumbnail PDF

File

DagSemProc.09031.8.pdf
  • Filesize: 234 kB
  • 15 pages

Document Identifiers

Author Details

Anne Canteaut
Maria Naya-Plasencia

Cite As Get BibTex

Anne Canteaut and Maria Naya-Plasencia. Internal collision attack on Maraca. In Symmetric Cryptography. Dagstuhl Seminar Proceedings, Volume 9031, pp. 1-15, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009) https://doi.org/10.4230/DagSemProc.09031.8

Abstract

We present an internal collision attack against the new hash
function Maraca which has been submitted to the SHA-3 competition.
This attack requires 2^{237} calls to the round function and its complexity is
lower than the complexity of the generic collision attack when the length
of the message digest is greater than or equal to 512. It is shown that
this cryptanalysis mainly exploits some particular differential properties
of the inner permutation, which are in some sense in contradiction with
the usual security criterion which guarantees the resistance to differential
attacks.

Subject Classification

Keywords
  • Hash function
  • collision attack
  • differential cryptanalysis
  • Boolean function

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail