Two Attacks on RadioGatún

@inproceedings{Khovratovich2008TwoAO,
  title={Two Attacks on RadioGat{\'u}n},
  author={D. Khovratovich},
  booktitle={INDOCRYPT},
  year={2008}
}
  • D. Khovratovich
  • Published in INDOCRYPT 2008
  • Mathematics, Computer Science
  • We investigate the security of the hash function design called RadioGatun in a recently proposed framework of sponge functions. We show that previously introduced symmetric trails can hardly be used to construct collisions and to find a second preimage efficiently. As a generalization of truncated differentials, trails with linear and non-linear restrictions on differences are proposed. We use these trails to find semi-free-start collisions and second preimages with the meet-in-the middle… CONTINUE READING
    7 Citations
    Cryptanalysis of RadioGatun
    • 11
    • PDF
    Cryptanalysis of EnRUPT
    • 3
    • PDF
    Methods of Symmetric Cryptanalysis
    • 1
    • PDF
    Keccak sponge function family main document
    • 255
    • PDF
    The Kђѐѐюј reference
    The Making of KECCAK
    • 43

    References

    SHOWING 1-10 OF 16 REFERENCES
    Producing Collisions for Panama, Instantaneously
    • 12
    • PDF
    The Grindahl Hash Functions
    • 62
    • PDF
    RadioGatún, a belt-and-mill hash function
    • 64
    • Highly Influential
    • PDF
    Cryptanalysis of Grindahl
    • 58
    • PDF
    Sponge Functions
    • 162
    • Highly Influential
    • PDF
    On the Indifferentiability of the Sponge Construction
    • 351
    • PDF
    The Design of Rijndael
    • 1,732
    Fast Hashing and Stream Encryption with PANAMA
    • 97
    • PDF