通信学报Issue(2):40-45,6.DOI:10.3969/j.issn.1000-436x.2014.02.006
带消息填充的29步SM3算法原根和伪碰撞攻击
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
摘要
Abstract
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time com-plexities are 2254 and 2125 respectively. Therefore, the 29-step SM3 hash function is not immune to preimage and pseu-do-collision attack.关键词
杂凑函数/原根攻击/碰撞攻击/中间相遇攻击/SM3Key words
hash function/preimage attack/collision attack/meet-in-the-middle attack/SM3分类
信息技术与安全科学引用本文复制引用
王高丽,申延召..带消息填充的29步SM3算法原根和伪碰撞攻击[J].通信学报,2014,(2):40-45,6.基金项目
国家自然科学基金资助项目(61103238,61373142);中央高校基本科研业务费专项基金资助项目;中国科学院信息工程研究所信息安全国家重点实验室开放课题基金资助项目Foundation Items:The National Natural Science Foundation of China (61103238,61373142) (61103238,61373142)
The Fundamental Research Funds for the Central Universities ()
The Opening Project of State Key Laboratory of Information Security of Institute of Information Engineer-ing of Chinese Academy of Sciences ()