通信学报2018,Vol.39Issue(1):46-55,10.DOI:10.11959/j.issn.1000-436x.2018011
对缩减轮数SM3散列函数改进的原像与伪碰撞攻击
Improved preimage and pseudo-collision attacks on SM3 hash function
摘要
Abstract
A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known best preimage attack on SM3 was only 30-step.The 33-step pseudo-collision attack was constructed by using the same techniques.The preimage attack on 32-step SM3 can be computed with a complexity of 2254.5,and a memory of 25.Furthermore,The pseudo-preimage and pseudo-collision attacks on 33-step SM3 by extending the differential characteristic of the 32-step preimage attack were present.The pseudo-collision attack on 33-step SM3 can be computed with a complexity of 2126.7,and a memory of 23.关键词
SM3散列函数/原像攻击/伪碰撞攻击/差分中间相遇攻击/bicliqueKey words
SM3/hash function/preimage attack/pseudo-collision attack/differential meet-in-the-middle/biclique分类
信息技术与安全科学引用本文复制引用
邹剑,董乐..对缩减轮数SM3散列函数改进的原像与伪碰撞攻击[J].通信学报,2018,39(1):46-55,10.基金项目
福建省中青年教师教育科研基金资助项目(No.JAT170097) (No.JAT170097)
福州大学科研启动基金资助项目(No.510150)The Education and Research Projects for Young Teachers in Fujian Province (No.JAT170097),The Research Startup Project of Fuzhou University (No.510150) (No.510150)