Cryptanalysis of LASH

  • Authors:
  • Ron Steinfeld;Scott Contini;Krystian Matusiewicz;Josef Pieprzyk;Jian Guo;San Ling;Huaxiong Wang

  • Affiliations:
  • Advanced Computing --- Algorithms and Cryptography, Department of Computing, Macquarie University,;Advanced Computing --- Algorithms and Cryptography, Department of Computing, Macquarie University,;Advanced Computing --- Algorithms and Cryptography, Department of Computing, Macquarie University,;Advanced Computing --- Algorithms and Cryptography, Department of Computing, Macquarie University,;Division of Mathematical Sciences, School of Physical & Mathematical Sciences, Nanyang Technological University,;Division of Mathematical Sciences, School of Physical & Mathematical Sciences, Nanyang Technological University,;Advanced Computing --- Algorithms and Cryptography, Department of Computing, Macquarie University, and Division of Mathematical Sciences, School of Physical & Mathematical Sciences, Nanyang Techno ...

  • Venue:
  • Fast Software Encryption
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

We show that the LASH-xhash function is vulnerable to attacks that trade time for memory, including collision attacks as fast as 2(4x/11)and preimage attacks as fast as 2(4x/7). Moreover, we briefly mention heuristic lattice based collision attacks that use small memory but require very long messages that are expected to find collisions much faster than 2x/2. All of these attacks exploit the designers' choice of an all zero IV.We then consider whether LASH can be patched simply by changing the IV. In this case, we show that LASH is vulnerable to a 2(7x/8)preimage attack. We also show that LASH is trivially not a PRF when any subset of input bytes is used as a secret key. None of our attacks depend upon the particular contents of the LASH matrix --- we only assume that the distribution of elements is more or less uniform.Additionally, we show a generalized birthday attack on the final compression of LASH which requires $O\left(x2^{\frac{x}{2(1+\frac{107}{105})}}\right) \approx O(x2^{x/4})$ time and memory. Our method extends the Wagner algorithm to truncated sums, as is done in the final transform in LASH.