About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Book chapter · Conference paper

Rebound Attacks on the Reduced Grøstl Hash Function

From

Graz University of Technology1

Department of Mathematics, Technical University of Denmark2

Discrete mathematics, Department of Mathematics, Technical University of Denmark3

Grøstl is one of 14 second round candidates of the NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression function of Grøstl-256 have already been published. However, little is known about the hash function, arguably a much more interesting cryptanalytic setting. Also, Grøstl-512 has not been analyzed yet.

In this paper, we show the first cryptanalytic attacks on reduced-round versions of the Grøstl hash functions. These results are obtained by several extensions of the rebound attack. We present a collision attack on 4/10 rounds of the Grøstl-256 hash function and 5/14 rounds of the Grøstl- 512 hash functions.

Additionally, we give the best collision attack for reduced-round (7/10 and 7/14) versions of the compression function of Grøstl-256 and Grøstl-512.

Language: English
Publisher: Springer Berlin Heidelberg
Year: 2010
Pages: 350-365
Proceedings: CT-RSA 2010
ISSN: 16113349 and 03029743
Types: Book chapter and Conference paper
DOI: 10.1007/978-3-642-11925-5_24

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis