A SECOND PRE-IMAGE ATTACK AND A COLLISION ATTACK TO CRYPTOGRAPHIC HASH FUNCTION LUX

dc.authorwosid Saygi, Elif/AAM-5834-2020
dc.authorwosid Koçak, Onur/AAF-5065-2019
dc.contributor.author Sulak, Fatih
dc.contributor.author Kocak, Onur
dc.contributor.author Saygi, Elif
dc.contributor.author Ogunc, Merve
dc.contributor.author Bozdemir, Beyza
dc.contributor.other Mathematics
dc.date.accessioned 2024-07-05T14:30:50Z
dc.date.available 2024-07-05T14:30:50Z
dc.date.issued 2017
dc.department Atılım University en_US
dc.department-temp [Sulak, Fatih] Atilim Univ, Dept Math, Ankara, Turkey; [Kocak, Onur] TUBITAK BILGEM, TR-41470 Gebze, Kocaeli, Turkey; [Saygi, Elif] Hacettepe Univ, Elementary Math Educ, Dept Basic Educ Div, Ankara, Turkey; [Ogunc, Merve; Bozdemir, Beyza] METU, Cryptog Dept, Inst Appl Math, Ankara, Turkey en_US
dc.description.abstract Cryptography is a science that provides the security of information in communication. One of the most important sub-branches of cryptography is the hash functions. Hash functions are known as the digital fingerprints. Following the recent attacks on the widely used hash functions MD5 and SHA-1 and the increase in computational power, the need for a new hash function standard has arisen. For this purpose, US National Institute of Standards and Technology (NIST) had announced a competition to select a standard hash function algorithm which would eventually become the Third Secure Hash Algorithm, SHA-3. Initially 64 algorithms were submitted to NIST and 51 of them were announced as the First Round Candidates. After an analysis period, 14 of these algorithms were announced as the Second Round Candidates, and 5 algorithms were announced as Finalists. The winner of the competition, Keccak, was announced in 2012. LUX is one of the 64 algorithms submitted to the SHA-3 competition by Nikolic et al. It is designed as a byte oriented stream cipher based hash function. For LUX-256, Schmidt-Nielsen gave a distinguisher and later Wu et al. presented collision attacks, both of which for reduced rounds of LUX. As a result of these attacks, LUX is eliminated in the first round. In this work, we first give a procedure for the second preimage attack. Then we extend this to the collision and second preimage attacks for the reduced rounds of LUX hash family. Moreover, we implement the attacks and give the specific examples by taking the padding into consideration. en_US
dc.description.sponsorship TUBITAK [114F130] en_US
dc.description.sponsorship This work is supported by TUBITAK under the project number 114F130. en_US
dc.identifier.citationcount 1
dc.identifier.doi 10.1501/Commual_0000000794
dc.identifier.endpage 266 en_US
dc.identifier.issn 1303-5991
dc.identifier.issue 1 en_US
dc.identifier.startpage 254 en_US
dc.identifier.uri https://doi.org/10.1501/Commual_0000000794
dc.identifier.uri https://hdl.handle.net/20.500.14411/620
dc.identifier.volume 66 en_US
dc.identifier.wos WOS:000407115700025
dc.institutionauthor Sulak, Fatih
dc.language.iso en en_US
dc.publisher Ankara Univ, Fac Sci en_US
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.subject Cryptography en_US
dc.subject cryptanalysis en_US
dc.subject hash function en_US
dc.subject SHA-3 competition en_US
dc.subject LUX en_US
dc.title A SECOND PRE-IMAGE ATTACK AND A COLLISION ATTACK TO CRYPTOGRAPHIC HASH FUNCTION LUX en_US
dc.type Article en_US
dc.wos.citedbyCount 1
dspace.entity.type Publication
relation.isAuthorOfPublication 40b5c43b-abb5-47ad-9931-a3dcff0a8fe5
relation.isAuthorOfPublication.latestForDiscovery 40b5c43b-abb5-47ad-9931-a3dcff0a8fe5
relation.isOrgUnitOfPublication 31ddeb89-24da-4427-917a-250e710b969c
relation.isOrgUnitOfPublication.latestForDiscovery 31ddeb89-24da-4427-917a-250e710b969c

Files

Collections