Cryptography Reference
In-Depth Information
2. Compute R ( p j ,w j )for j =0 , 1 ,..., 97 and confirm whether or not the
resulting p 98 matches the form of
C 2
100
(( D 2
( D 2
E 100
E 100
100 ) [31 10] [9 4]
100 ) [3 0] )
.
If there is no match, go back to the first step. The match will occur with
probability 2 122 .
3. Compute E [7 0]
H D [7 0]
D 0[7 0]
D 100[7 0] (mod 2 8 ), and reassign
E 100[7 0] ← E [7 0] − E 0[7 0] .
4. Compute R ( p j ,w j )for j =0 , 1 ,..., 96 and confirm whether or not the
resulting p 97 matches the form of D 2
E 2
100
C 2
100
C 2
100
.Ifthere
is no match, go back to the first step. The match will occur with probability
2 128 .
100
As a result, we will find a preimage in 2 250 .
Note for Weak Hash Values. After setting up the intermediate variables in
Table 10, ( C 2
100 ) [ k ] =( D 2
1
100 ) [ k ] for k =0 , 1 holds with probability
2 .Thus,
1
4
of the hash value in 2 248 ,
1
2
we can compute a preimage for
of the hash value
in 2 249 ,and 4
of the hash value in 2 250 . On average, the attack complexity is
2 249 . 2 .
An Attack against HAS-V-288. We can attack HAS-V-288 in a similar
manner. On the right line, we can cancel the effect of B 98[7 2] .Ontheleft
line, unfortunately we cannot satisfy Eq. (10) anymore because E is directly
used to compute a part of the hash value. However, the condition is sometimes
automatically satisfied for a given hash value. For l =0 , 1 ,..., 6, we can compute
a preimage of HAS-V-288 in 2 256 −l for
( l )
2 6
of the hash values. On average, the
attack complexity is 2 253 . 5 .
 
 
Search WWH ::




Custom Search