Practical Collisions for EnRUPT

  • Authors:
  • Sebastiaan Indesteege;Bart Preneel

  • Affiliations:
  • Interdisciplinary Institute for BroadBand Technology (IBBT), Ghent, Belgium and Interdisciplinary Institute for BroadBand Technology (IBBT), Ghent, Belgium;Interdisciplinary Institute for BroadBand Technology (IBBT), Ghent, Belgium and Interdisciplinary Institute for BroadBand Technology (IBBT), Ghent, Belgium

  • Venue:
  • Journal of Cryptology
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The EnRUPT hash functions were proposed by O’Neil, Nohl and Henzen as candidates for the SHA-3 competition, organised by NIST. The proposal contains seven concrete hash functions, each with a different digest length. We present a practical collision attack on each of these seven EnRUPT variants. The time complexity of our attack varies from 236 to 240 round computations, depending on the EnRUPT variant, and the memory requirements are negligible. We demonstrate that our attack is practical by giving an actual collision example for EnRUPT-256.