Rebound Attacks on the Reduced Grøstl Hash Function

Florian Mendel, Christian Rechberger, Martin Schläffer, Søren Steffen Thomsen

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Grøstl is one of 14 second round candidates of the NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression function of Grøstl-256 have already been published. However, little is known about the hash function, arguably a much more interesting cryptanalytic setting. Also, Grøstl-512 has not been analyzed yet. In this paper, we show the first cryptanalytic attacks on reduced-round versions of the Grøstl hash functions. These results are obtained by several extensions of the rebound attack. We present a collision attack on 4/10 rounds of the Grøstl-256 hash function and 5/14 rounds of the Grøstl-512 hash functions. Additionally, we give the best collision attack for reduced-round (7/10 and 7/14) versions of the compression function of Grøstl-256 and Grøstl-512.
Original languageEnglish
Title of host publicationTopics in Cryptology - CT-RSA 2010
Place of PublicationBerlin; Heidelberg
PublisherSpringer
Pages350-365
ISBN (Print)978-3-642-11924-8
DOIs
Publication statusPublished - 2010
Event10th Cryptographers' Track at the RSA Conference: CT-RSA 2010 - San Francisco, United States
Duration: 1 Mar 20105 Mar 2010

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume5985

Conference

Conference10th Cryptographers' Track at the RSA Conference
Abbreviated titleCT-RSA 2010
Country/TerritoryUnited States
CitySan Francisco
Period1/03/105/03/10

Fields of Expertise

  • Information, Communication & Computing

Fingerprint

Dive into the research topics of 'Rebound Attacks on the Reduced Grøstl Hash Function'. Together they form a unique fingerprint.
  • EU - ECRYPT II - European network of excellence in cryptology - Phase II

    Schmidt, J.-M. (Co-Investigator (CoI)), Nad, T. (Co-Investigator (CoI)), Kirschbaum, M. (Co-Investigator (CoI)), Feldhofer, M. (Co-Investigator (CoI)), Schläffer, M. (Co-Investigator (CoI)), Aigner, M. J. (Co-Investigator (CoI)), Rechberger, C. (Co-Investigator (CoI)), Lamberger, M. (Co-Investigator (CoI)), Tillich, S. (Co-Investigator (CoI)), Medwed, M. (Co-Investigator (CoI)), Hutter, M. (Co-Investigator (CoI)), Rijmen, V. (Co-Investigator (CoI)), Mendel, F. (Co-Investigator (CoI)) & Posch, R. (Principal Investigator (PI))

    1/08/0831/01/13

    Project: Research project

  • Cryptography

    Schläffer, M. (Co-Investigator (CoI)), Oswald, M. E. (Co-Investigator (CoI)), Lipp, P. (Co-Investigator (CoI)), Dobraunig, C. E. (Co-Investigator (CoI)), Mendel, F. (Co-Investigator (CoI)), Eichlseder, M. (Co-Investigator (CoI)), Nad, T. (Co-Investigator (CoI)), Posch, R. (Co-Investigator (CoI)), Lamberger, M. (Co-Investigator (CoI)), Rijmen, V. (Co-Investigator (CoI)) & Rechberger, C. (Co-Investigator (CoI))

    1/01/9531/01/19

    Project: Research area

Cite this