Paper 2014/1012
The Boomerang Attacks on BLAKE and BLAKE2
Yonglin Hao
Abstract
n this paper, we study the security margins of hash functions BLAKE and BLAKE2 against the boomerang attack. We launch boomerang attacks on all four members of BLAKE and BLAKE2, and compare their complexities. We propose 8.5-round boomerang attacks on both BLAKE-512 and BLAKE2b with complexities
Note: My first study on Hash Functions
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Minor revision. Inscrypt 2014
- Keywords
- CryptanalysisBoomerangBLAKEBLAKE2Message ModificationDifferential Characteristics
- Contact author(s)
- haoyl14 @ mails tsinghua edu cn
- History
- 2014-12-26: received
- Short URL
- https://ia.cr/2014/1012
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/1012, author = {Yonglin Hao}, title = {The Boomerang Attacks on {BLAKE} and {BLAKE2}}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/1012}, year = {2014}, url = {https://eprint.iacr.org/2014/1012} }