Sciweavers

ICICS
2007
Springer

Extending FORK-256 Attack to the Full Hash Function

14 years 5 months ago
Extending FORK-256 Attack to the Full Hash Function
Abstract. In a paper published in FSE 2007, a way of obtaining nearcollisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained examples of near-collisions for the compression function, but in practice the attack could not be extended to the full function due to large memory requirements and computation time. In this paper we improve the attack and show that it is possible to find near-collisions in practice for any given value of IV. In particular, this means that the full hash function with the prespecified IV is vulnerable in practice, not just in theory. We exhibit an example near-collision for the complete hash function.
Scott Contini, Krystian Matusiewicz, Josef Pieprzy
Added 08 Jun 2010
Updated 08 Jun 2010
Type Conference
Year 2007
Where ICICS
Authors Scott Contini, Krystian Matusiewicz, Josef Pieprzyk
Comments (0)