Paper 2011/148

Near-Collision Attack on the Step-Reduced Compression Function of Skein-256

Hongbo Yu, Jiazhe Chen, Keting jia, and Xiaoyun Wang

Abstract

The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designed based on the threefish block cipher and it only uses three primitive operations: modular addition, rotation and bitwise XOR (ARX). In this paper, we combine two short differential paths to a long differential path using the modular differential technique. And we present the semi-free start near-collision attack up to the 32-step Skein-256 with the Hamming difference 51. The complexity of our attack is about $2^{105}$.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
Hash functionSkeinSHA-3
Contact author(s)
yuhongbo @ mail tsinghua edu cn
History
2011-04-01: revised
2011-03-27: received
See all versions
Short URL
https://ia.cr/2011/148
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/148,
      author = {Hongbo Yu and Jiazhe Chen and Keting jia and Xiaoyun Wang},
      title = {Near-Collision Attack on the Step-Reduced Compression Function of Skein-256},
      howpublished = {Cryptology ePrint Archive, Paper 2011/148},
      year = {2011},
      note = {\url{https://eprint.iacr.org/2011/148}},
      url = {https://eprint.iacr.org/2011/148}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.