A SECOND PRE-IMAGE ATTACK AND A COLLISION ATTACK TO CRYPTOGRAPHIC HASH FUNCTION LUX

No Thumbnail Available

Date

2017

Journal Title

Journal ISSN

Volume Title

Publisher

Research Projects

Organizational Units

Organizational Unit
Mathematics
(2000)
The Atılım University Department of Mathematics was founded in 2000 and it offers education in English. The Department offers students the opportunity to obtain a certificate in Mathematical Finance or Cryptography, aside from their undergraduate diploma. Our students may obtain a diploma secondary to their diploma in Mathematics with the Double-Major Program; as well as a certificate in their minor alongside their diploma in Mathematics through the Minor Program. Our graduates may pursue a career in academics at universities, as well as be hired in sectors such as finance, education, banking, and informatics. Our Department has been accredited by the evaluation and accreditation organization FEDEK for a duration of 5 years (until September 30th, 2025), the maximum FEDEK accreditation period achievable. Our Department is globally and nationally among the leading Mathematics departments with a program that suits international standards and a qualified academic staff; even more so for the last five years with our rankings in the field rankings of URAP, THE, USNEWS and WEBOFMETRIC.

Journal Issue

Abstract

Cryptography is a science that provides the security of informationin communication. One of the most important sub-branches of cryptographyis the hash functions. Hash functions are known as the digital ...ngerprints.Following the recent attacks on the widely used hash functions MD5 and SHA1 and the increase in computational power, the need for a new hash functionstandard has arisen. For this purpose, US National Institute of Standards andTechnology (NIST) had announced a competition to select a standard hashfunction algorithm which would eventually become the Third Secure HashAlgorithm, SHA-3. Initially 64 algorithms were submitted to NIST and 51 ofthem were announced as the First Round Candidates. After an analysis period,14 of these algorithms were announced as the Second Round Candidates, and5 algorithms were announced as Finalists. The winner of the competition,Keccak, was announced in 2012.LUX is one of the 64 algorithms submitted to the SHA-3 competition byNikolic et al.function. For LUX-256, Schmidt-Nielsen gave a distinguisher and later Wu etal. presented collision attacks, both of which for reduced rounds of LUX. As aresult of these attacks, LUX is eliminated in the ...rst round. In this work, we...rst give a procedure for the second preimage attack. Then we extend this tothe collision and second preimage attacks for the reduced rounds of LUX hashfamily. Moreover, we implement the attacks and give the speci...c examples bytaking the padding into consideration.

Description

Keywords

Matematik, İstatistik ve Olasılık

Turkish CoHE Thesis Center URL

Citation

0

WoS Q

Scopus Q

N/A

Source

Communications Faculty of Sciences University of Ankara Series A1: Mathematics and Statistics

Volume

66

Issue

1

Start Page

254

End Page

266

Collections