HAS-160 is an iterated cryptographic hash function that is widely used in Korea. In this article, we present a collision attack on the hash function HAS-160 reduced to 53-steps. The attack has a complexity of about 235 hash computations. It is based on the work of Cho et al. presented at ICISC 2006. We improve the attack complexity of Cho et al. by a factor of about 2 20 using a slightly different strategy for message modification in the first 20 steps of the hash function and present the first actual colliding message pair for 53-step HAS-160. Furthermore, we show how the attack can be extended to 59-step HAS-160 by using a characteristic spanning over two message blocks. © Springer-Verlag Berlin Heidelberg 2007.status: publishe
Abstract. MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the...
© Springer-Verlag Berlin Heidelberg 1993. In [ZMI89, ZMI90] two constructions for a collision resist...
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 c...
HAS-160 is a cryptographic hash function which is designed and used widely in Korea. In ICISC 2005, ...
HAS-160 is a cryptographic hash function designed and used widely in Korea. While similar in structu...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions...
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. ...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bossela...
. This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses o...
In 2010, Tao Xie and Dengguo Feng [XF10] constructed the first single-block collision for MD5 consis...
Abstract. In this article, we describe a novel collision attack for up to 5 rounds of the Grøstl has...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address w...
Abstract. MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the...
© Springer-Verlag Berlin Heidelberg 1993. In [ZMI89, ZMI90] two constructions for a collision resist...
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 c...
HAS-160 is a cryptographic hash function which is designed and used widely in Korea. In ICISC 2005, ...
HAS-160 is a cryptographic hash function designed and used widely in Korea. While similar in structu...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions...
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. ...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bossela...
. This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses o...
In 2010, Tao Xie and Dengguo Feng [XF10] constructed the first single-block collision for MD5 consis...
Abstract. In this article, we describe a novel collision attack for up to 5 rounds of the Grøstl has...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address w...
Abstract. MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the...
© Springer-Verlag Berlin Heidelberg 1993. In [ZMI89, ZMI90] two constructions for a collision resist...
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 c...