Advertisement

Improved cryptanalysis of step-reduced SM3

  • Yanzhao Shen
  • Dongxia Bai
  • Hongbo Yu
Highlight
  • 55 Downloads

Notes

Acknowledgements

This work was supported by National Basic Research Program of China (973 Program) (Grant No. 2013CB834205) and National Natural Science Foundation of China (Grant No. 61373142).

References

  1. 1.
    Standardization Administration of the People’s Republic of China. Information security techniques — SM3 cryptographic hash algorithm. GB/T 32905-2016. http://www.sac.gov.cn/gzfw/ggcx/gjbzgg/201614/Google Scholar
  2. 2.
    Zou J, Wu W, Wu S, et al. Preimage attacks on stepreduced SM3 hash function. In: Proceedings of the 14th International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2011. 375–390zbMATHGoogle Scholar
  3. 3.
    Wang G, Shen Y. Preimage and pseudo-collision attacks on step-reduced SM3 hash function. Inf Proc Lett, 2013, 113: 301–306MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Bai D, Yu H, Wang G, et al. Improved boomerang attacks on SM3. In: Proceedings of the 18th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2013. 251–266zbMATHGoogle Scholar
  5. 5.
    Bai D, Yu H, Wang G, et al. Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. IET Inf Secur, 2014, 9: 167–178CrossRefGoogle Scholar
  6. 6.
    Knellwolf S, Khovratovich D. New preimage attacks against reduced SHA-1. In: Proceedings of the 32nd Annual Cryptology Conference. Berlin: Springer-Verlag, 2012. 367–383zbMATHGoogle Scholar
  7. 7.
    Yu H, Chen J, Wang X. The boomerang attacks on the round-reduced Skein-512. In: Proceedings of the 19th International Conference on Selected Areas in Cryptography. Berlin: Springer-Verlag, 2012. 287–303zbMATHGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  1. 1.Key Laboratory of Cryptologic Technology and Information Security, Ministry of EducationShandong UniversityJinanChina
  2. 2.School of MathematicsShandong UniversityJinanChina
  3. 3.Department of Computer Science and TechnologyTsinghua UniversityBeijingChina
  4. 4.Science and Technology on Communication Security LaboratoryChengduChina

Personalised recommendations