Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2<sup>254</sup>and 2<sup>125</sup>respecti...

Full description

Bibliographic Details
Main Authors: Gao-li WANG, Yan-zhao SHEN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2014-02-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2014.02.006/