Abstract | ||
---|---|---|
The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is designed to replace the old Independent States (CIS) standard GOST 34.311-95. The Kupyna hash function is an AES-based primitive, which uses Merkle-Damgard compression function based on Even-Mansour design. In this paper, we show the first cryptanalytic attacks on the round-reduced Kupyna hash function. Using the rebound attack, we present a collision attack on 5-round of the Kupyna-256 hash function. The complexity of this collision attack is (2, 2) (in time and memory). Furthermore, we use guess-anddetermine MitM attack to construct pseudo-preimage attacks on 6-round Kupyna-256 and Kupyna-512 hash function, respectively. The complexity of these preimage attacks are (2, 2) and (2, 2) (in time and memory), respectively. |
Year | Venue | Field |
---|---|---|
2015 | IACR Cryptology ePrint Archive | SHA-2,Double hashing,Computer science,Cryptographic hash function,Arithmetic,Hash buster,Hash function,Hash chain,Collision attack,MDC-2 |
DocType | Volume | Citations |
Journal | 2015 | 1 |
PageRank | References | Authors |
0.37 | 19 | 2 |