On the Collision Resistance of RIPEMD-160
- Cite this paper as:
- Mendel F., Pramstaller N., Rechberger C., Rijmen V. (2006) On the Collision Resistance of RIPEMD-160. In: Katsikas S.K., López J., Backes M., Gritzalis S., Preneel B. (eds) Information Security. ISC 2006. Lecture Notes in Computer Science, vol 4176. Springer, Berlin, Heidelberg
In this article, the RIPEMD-160 hash function is studied in detail. To analyze the hash function, we have extended existing approaches and used recent results in cryptanalysis. While RIPEMD and RIPEMD-128 reduced to 3 rounds are vulnerable to the attack, it is not feasible for RIPEMD-160. Furthermore, we present an analytical attack on a round-reduced variant of the RIPEMD-160 hash function. To the best of our knowledge this is the first article that investigates the impact of recent advances in cryptanalysis of hash functions on RIPEMD-160.
KeywordsRIPEMD-160 low-weight codewords hash function cryptanalysis collision attack differential attack
Unable to display preview. Download preview PDF.