Second Preimage Attack on SHAMATA-512

  • Authors:
  • Kota Ideguchi;Dai Watanabe

  • Affiliations:
  • Systems Development Laboratory, Hitachi, LTD,;Systems Development Laboratory, Hitachi, LTD,

  • Venue:
  • INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a second preimage attack on SHAMATA-512, which is a hash function of 512-bit output and one of the first round candidates of the SHA-3 competition. The attack controls several message blocks to fix some variables of internal state and uses a meet-in-the-middle approach to find second preimages. The time complexity is about 2452.7 computations of the step function and the memory complexity is about 2451.4 blocks of 128 bits.