[Resource Topic] 2009/112: A 2nd-Preimage Attack on AURORA-512

Welcome to the resource topic for 2009/112

Title:
A 2nd-Preimage Attack on AURORA-512

Authors: Yu Sasaki

Abstract:

In this note, we present a 2nd-preimage attack on AURORA-512, which is one of the candidates for SHA-3. Our attack can generate 2nd-preimages of any given message, in particular, the attack complexity becomes optimal when the message length is 9 blocks or more. In such a case, the attack complexity is approximately 2^{290} AURORA-512 operations, which is less than the brute force attack on AURORA-512, namely, 2^{512-\log_2{9}}\approx2^{508}. Our attack exploits some weakness in the mode of operation.

ePrint: https://eprint.iacr.org/2009/112

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .