Preimage and Second-Preimage attacks on PGV hashing modes of Round-Reduced ARIA, camellia, and serpent

Deukjo Hong, Bonwook Koo, Dong Chan Kim

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

We present pseudo-preimage attacks on Davis-Meyer mode of reduced rounds of the block ciphers ARIA, Camellia, and Serpent by using Sasaki's framework. They yield preimage or second-preimage attacks on PGV hashing modes. We develop proper initial structures for applying eet-in-the-middle techniques to the block ciphers, by considering their diffusion layers, and propose a method to find matching-check equations for indirect partial matching technique with a binary matrix. These works enable us to attack 5 rounds of ARIA, 7 rounds of Camellia, and 4 rounds of Serpent faster than brute force attack.

Original languageEnglish
Pages (from-to)372-380
Number of pages9
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE-95-A
Issue number1
DOIs
StatePublished - Jan 2012

Keywords

  • ARIA
  • Camellia
  • Hash function
  • Meetin-the-middle
  • PGV
  • Preimage
  • Serpent

Fingerprint

Dive into the research topics of 'Preimage and Second-Preimage attacks on PGV hashing modes of Round-Reduced ARIA, camellia, and serpent'. Together they form a unique fingerprint.

Cite this