ICICS 2005
Publication date:
2005-01-01
Volume:
3783
Pages:
147 -
158
ISSN:
3540309349, 9783540309345
Publisher:
Springer
Lecture Notes in Computer Science
Author:
Kim, J
Biryukov, Alex ; Preneel, Bart ; Lee, S ; Qing, Sihan ; Mao, Wenbo ; López, Javier ; Wang, Guilin
Keywords:
rectangle attacks, reduced rounds, hash functions, shacal-2, sha-1, cryptanalysis, collisions, boomerang, cosic
Abstract:
In this paper, we cryptanalyze the compression functions of MD4, MD5 and 4-, 5-pass HAVAL in encryption mode. We exploit the recently proposed related-key rectangle and boomerang techniques to show non-randomness of MD4, MD5 and 4-, 5-pass HAVAL and to distinguish them from a randomly chosen cipher. The attacks are highly practical and have been confirmed by our experiments.