Download PDF

ICICS 2005

Publication date: 2005-01-01
Volume: 3783 Pages: 147 - 158
ISSN: 3540309349, 9783540309345
Publisher: Springer

Lecture Notes in Computer Science

Author:

Kim, J
Biryukov, Alex ; Preneel, Bart ; Lee, S ; Qing, Sihan ; Mao, Wenbo ; López, Javier ; Wang, Guilin

Keywords:

rectangle attacks, reduced rounds, hash functions, shacal-2, sha-1, cryptanalysis, collisions, boomerang, cosic

Abstract:

In this paper, we cryptanalyze the compression functions of MD4, MD5 and 4-, 5-pass HAVAL in encryption mode. We exploit the recently proposed related-key rectangle and boomerang techniques to show non-randomness of MD4, MD5 and 4-, 5-pass HAVAL and to distinguish them from a randomly chosen cipher. The attacks are highly practical and have been confirmed by our experiments.