Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions

Gautham Sekar and Soumyadeep Bhattacharya
Volume: 12, No: 2, Page: 310 ~ 312, Year: 2016
10.3745/JIPS.03.0021
Keywords: Cryptanalysis, Hash Function, (Second) Preimage Attack
Full Text:

Abstract
TCS_SHA-3 is a family of four cryptographic hash functions that are covered by a United States patent (US 2009/0262925). The digest sizes are 224, 256, 384 and 512 bits. The hash functions use bijective functions in place of the standard compression functions. In this paper we describe first and second preimage attacks on the full hash functions. The second preimage attack requires negligible time and the first preimage attack requires O(236) time. In addition to these attacks, we also present a negligible time second preimage attack on a strengthened variant of the TCS_SHA-3. All the attacks have negligible memory requirements. To the best of our knowledge, there is no prior cryptanalysis of any member of the TCS_SHA-3 family in the literature.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.


Cite this article
IEEE Style
Gautham Sekar and Soumyadeep Bhattacharya , "Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions," Journal of Information Processing Systems, vol. 12, no. 2, pp. 310~312, 2016. DOI: 10.3745/JIPS.03.0021.

ACM Style
Gautham Sekar and Soumyadeep Bhattacharya , "Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions," Journal of Information Processing Systems, 12, 2, (2016), 310~312. DOI: 10.3745/JIPS.03.0021.