Advertisement

Finding Collision on 45-Step HAS-160

  • Aaram Yun
  • Soo Hak Sung
  • Sangwoo Park
  • Donghoon Chang
  • Seokhie Hong
  • Hong-Su Cho
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3935)

Abstract

HAS-160 is a cryptographic hash function designed and used widely in Korea. While similar in structure to SHA-1, up to now there was no published attack or security analysis of the algorithm. Applying techniques introduced by Wang et al. [1], we have found collision in the first 45 steps of HAS-160, with complexity 212.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1–18. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Telecommunications Technology Association, Hash Function Standard Part 2: Hash Function Algorithm Standard (HAS-160), TTAS.KO-12.0011/R1 (December 2000)Google Scholar
  4. 4.
    FIPS 180-2, Secure Hash Standard (2002), http://csrc.nist.gov/publications/
  5. 5.
    Wang, X., Yu, H., Yin, Y.L.: Efficient Collision Search Attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 1–16. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Aaram Yun
    • 1
  • Soo Hak Sung
    • 2
  • Sangwoo Park
    • 1
  • Donghoon Chang
    • 3
  • Seokhie Hong
    • 3
  • Hong-Su Cho
    • 4
  1. 1.National Security Research InstituteDaejeonKorea
  2. 2.Department of Computing information & mathematicsPaichai UniversityDaejeonKorea
  3. 3.Center for Information and Security TechnologiesKorea UniversitySeoulKorea
  4. 4.Graduate School of Information SecurityKorea UniversitySeoulKorea

Personalised recommendations