Improved cryptanalysis of step-reduced SM3

This is a preview of subscription content, access via your institution.

References

  1. 1

    Standardization Administration of the People’s Republic of China. Information security techniques — SM3 cryptographic hash algorithm. GB/T 32905-2016. http://www.sac.gov.cn/gzfw/ggcx/gjbzgg/201614/

  2. 2

    Zou J, Wu W, Wu S, et al. Preimage attacks on stepreduced SM3 hash function. In: Proceedings of the 14th International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2011. 375–390

    Google Scholar 

  3. 3

    Wang G, Shen Y. Preimage and pseudo-collision attacks on step-reduced SM3 hash function. Inf Proc Lett, 2013, 113: 301–306

    MathSciNet  Article  MATH  Google Scholar 

  4. 4

    Bai D, Yu H, Wang G, et al. Improved boomerang attacks on SM3. In: Proceedings of the 18th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2013. 251–266

    Google Scholar 

  5. 5

    Bai D, Yu H, Wang G, et al. Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. IET Inf Secur, 2014, 9: 167–178

    Article  Google Scholar 

  6. 6

    Knellwolf S, Khovratovich D. New preimage attacks against reduced SHA-1. In: Proceedings of the 32nd Annual Cryptology Conference. Berlin: Springer-Verlag, 2012. 367–383

    Google Scholar 

  7. 7

    Yu H, Chen J, Wang X. The boomerang attacks on the round-reduced Skein-512. In: Proceedings of the 19th International Conference on Selected Areas in Cryptography. Berlin: Springer-Verlag, 2012. 287–303

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Basic Research Program of China (973 Program) (Grant No. 2013CB834205) and National Natural Science Foundation of China (Grant No. 61373142).

Author information

Affiliations

Authors

Corresponding author

Correspondence to Hongbo Yu.

Additional information

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Shen, Y., Bai, D. & Yu, H. Improved cryptanalysis of step-reduced SM3. Sci. China Inf. Sci. 61, 038105 (2018). https://doi.org/10.1007/s11432-017-9119-6

Download citation