Title
Improved Boomerang Attacks on SM3.
Abstract
The cryptographic hash function SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of electronic certification service system in China. It is based on the Merkle-Damgård design and is very similar to SHA-2 but includes some additional strengthening features. In this paper, we apply the boomerang attack to SM3 compression function, and present such distinguishers on up to 34/35/36/37 steps out of 64 steps, with time complexities 231.4, 233.6, 273.4 and 293 compression function calls respectively. Especially, we are able to obtain the examples of the distinguishers on 34-step and 35-step on a PC due to their practical complexities. In addition, incompatible problems in the recent boomerang attack are pointed out. © 2013 Springer-Verlag.
Year
DOI
Venue
2013
10.1007/978-3-642-39059-3_17
ACISP
Keywords
Field
DocType
boomerang attack,cryptanalysis,hash function,sm3
Boomerang attack,Computer science,Computer security,Cryptography,Cryptographic hash function,Service system,Cryptanalysis,Theoretical computer science,Hash function,Certification
Conference
Volume
Issue
ISSN
7959 LNCS
null
16113349
Citations 
PageRank 
References 
2
0.42
22
Authors
4
Name
Order
Citations
PageRank
Dongxia Bai1213.94
Hongbo Yu21782114.27
Gaoli Wang39412.77
Xiaoyun Wang42338170.86