Low-Weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512

Date Added: Aug 2010
Format: PDF

Cryptographic hash functions play important roles in modern cryptology. Many cryptographic protocols require a secure hash function which holds several security properties classically including a preimage resistance, a second preimage resistance and a collision resistance. Due to the recent attacks on commonly used hash function (e.g.: MD5, SHA-1), NIST announced the SHA-3 competition to decide an advanced hash function standard. In November 2008, NIST received 64 submissions, and 51 candidates proceed in the first round. In July 2009, NIST announced the 14 second round candidates. Shabal, which is designed by E. Bresson et al, is one of the second round candidates of the SHA-3 competition. Shabal employs an original mode of operation using a keyed permutation.