Paper 2006/334

Colliding Message Pair for 53-Step HAS-160

Florian Mendel

Abstract

We present a collision attack on the hash function HAS-160 reduced to 53-steps. The attack has a complexity of about $2^{35}$ hash computations. The attack is based on the work of Cho etal. presented at ICISC 2006. In this article, we improve their attack complexity by a factor of about $2^{20}$ using a slightly different strategy for message modification in the first 20 steps of the hash function.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
cryptanalysiscollision attackhash functions
Contact author(s)
florian mendel @ iaik tugraz at
History
2006-10-05: received
Short URL
https://ia.cr/2006/334
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2006/334,
      author = {Florian Mendel},
      title = {Colliding Message Pair for 53-Step HAS-160},
      howpublished = {Cryptology ePrint Archive, Paper 2006/334},
      year = {2006},
      note = {\url{https://eprint.iacr.org/2006/334}},
      url = {https://eprint.iacr.org/2006/334}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.