On the Collision Resistance of RIPEMD-160

  • Florian Mendel
  • Norbert Pramstaller
  • Christian Rechberger
  • Vincent Rijmen
Conference paper

DOI: 10.1007/11836810_8

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4176)
Cite this paper as:
Mendel F., Pramstaller N., Rechberger C., Rijmen V. (2006) On the Collision Resistance of RIPEMD-160. In: Katsikas S.K., López J., Backes M., Gritzalis S., Preneel B. (eds) Information Security. ISC 2006. Lecture Notes in Computer Science, vol 4176. Springer, Berlin, Heidelberg

Abstract

In this article, the RIPEMD-160 hash function is studied in detail. To analyze the hash function, we have extended existing approaches and used recent results in cryptanalysis. While RIPEMD and RIPEMD-128 reduced to 3 rounds are vulnerable to the attack, it is not feasible for RIPEMD-160. Furthermore, we present an analytical attack on a round-reduced variant of the RIPEMD-160 hash function. To the best of our knowledge this is the first article that investigates the impact of recent advances in cryptanalysis of hash functions on RIPEMD-160.

Keywords

RIPEMD-160 low-weight codewords hash function cryptanalysis collision attack differential attack 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Florian Mendel
    • 1
  • Norbert Pramstaller
    • 1
  • Christian Rechberger
    • 1
  • Vincent Rijmen
    • 1
  1. 1.Institute for Applied Information Processing and Communications (IAIK)Graz University of TechnologyAustria

Personalised recommendations