NEW PSEUDO NEAR COLLISION ATTACK ON TIGER

Dibyendu Mallik, Debdeep Mukhopadhyay

2010

Abstract

Tiger is a cryptographic hash function created by Anderson and Biham in 1996 with hash value of 192 bits. Reduced round variants of Tiger have shown some weaknesses recently. Kelsey and Lucks have shown a collision attack on Tiger reduced to round 16 and 17. Mendel and Rijmen have found 1 bit pseudo near collision for full round Tiger. In this article we discover a new key schedule differential for Tiger which leads to the finding of message pairs for 1-bit pseudo near collision.

References

  1. Anderson, R. J. and Biham, E. (1996). Tiger: A fast new hash function. In Gollmann, D., editor, FSE, volume 1039 of LNCS, pages 89-97. Springer.
  2. Dobbertin, H. (1998). Cryptanalysis of md4. J. Cryptology, 11(4):253-271.
  3. Kelsey, J. and Lucks, S. (2006). Collisions and nearcollisions for reduced-round tiger. In FSE, volume 4047 of LNCS, pages 111-125. Springer.
  4. Mendel, F., Preneel, B., Rijmen, V., Yoshida, H., and Watanabe, D. (2006). Update on tiger. In INDOCRYPT, pages 63-79.
  5. Mendel, F. and Rijmen, V. (2007). Cryptanalysis of the tiger hash function. In Kurosawa, K., editor, ASIACRYPT, volume 4833 of LNCS, pages 536-550. Springer.
  6. Rivest, R. L. (1990). The md4 message digest algorithm. In Menezes, A. and Vanstone, S. A., editors, CRYPTO, volume 537 of LNCS, pages 303-311. Springer.
  7. Yu, H. and Wang, X. (2007). Multi-collision attack on the compression functions of md4 and 3-pass haval. In Nam, K.-H. and Rhee, G., editors, ICISC, volume 4817 of LNCS, pages 206-226. Springer.
Download


Paper Citation


in Harvard Style

Mallik D. and Mukhopadhyay D. (2010). NEW PSEUDO NEAR COLLISION ATTACK ON TIGER . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 427-430. DOI: 10.5220/0002940104270430


in Bibtex Style

@conference{secrypt10,
author={Dibyendu Mallik and Debdeep Mukhopadhyay},
title={NEW PSEUDO NEAR COLLISION ATTACK ON TIGER},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={427-430},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002940104270430},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - NEW PSEUDO NEAR COLLISION ATTACK ON TIGER
SN - 978-989-8425-18-8
AU - Mallik D.
AU - Mukhopadhyay D.
PY - 2010
SP - 427
EP - 430
DO - 10.5220/0002940104270430