Improved preimage and pseudo-collision attacks on SM3 hash function

A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known best preimage attack on SM3 was only 30-step.Th...

Full description

Saved in:
Bibliographic Details
Main Authors: Jian ZOU, Le DONG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018011/
Tags: Add Tag
No Tags, Be the first to tag this record!