Analysis of the Hash Function Design Strategy Called SMASH

  • Authors:
  • M. Lamberger;N. Pramstaller;C. Rechberger;V. Rijmen

  • Affiliations:
  • Inst. of Appl. Inf. Process. & Commun., Graz Univ. of Technol., Graz;-;-;-

  • Venue:
  • IEEE Transactions on Information Theory
  • Year:
  • 2008

Quantified Score

Hi-index 754.84

Visualization

Abstract

The hash function design strategy SMASH was recently proposed as an alternative to the MD4 family of hash functions. It can be shown that the strategy leads to designs that are vulnerable to efficient collision and (second) preimage attacks. The mathematical structure of the SMASH description facilitates the description of the weakness and the resulting attacks, but also functions with less mathematical elegance may show similar weaknesses.