Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2016/396

Cryptanalysis of Haraka

Jérémy Jean

Abstract

In this note, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about $2^{16}$ function evaluations. Second, we invalidate the preimage security claim for Haraka-512/256 with an attack finding one preimage in about $2^{192}$ function evaluations. These attacks are possible thanks to symmetries in the internal state that are preserved over several rounds.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Hash FunctionPreimage AttackCollision Attack
Contact author(s)
Jeremy Jean @ ssi gouv fr
History
2016-04-21: received
Short URL
https://ia.cr/2016/396
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/396,
      author = {Jérémy Jean},
      title = {Cryptanalysis of Haraka},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/396},
      year = {2016},
      url = {https://eprint.iacr.org/2016/396}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.