[Resource Topic] 2009/443: Rebound Attack on the Full LANE Compression Function

Welcome to the resource topic for 2009/443

Title:
Rebound Attack on the Full LANE Compression Function

Authors: Krystian Matusiewicz, Maria Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer

Abstract:

In this work, we apply the rebound attack to the AES based SHA-3 candidate LANE. The hash function LANE uses a permutation based compression function, consisting of a linear message expansion and 6 parallel lanes. In the rebound attack on LANE, we apply several new techniques to construct a collision for the full compression function of LANE-256 and LANE-512. Using a relatively sparse truncated differential path, we are able to solve for a valid message expansion and colliding lanes independently. Additionally, we are able to apply the inbound phase more than once by exploiting the degrees of freedom in the parallel AES states. This allows us to construct semi-free-start collisions for full LANE-256 with 2^{96} compression function evaluations and 2^{88} memory, and for full LANE-512 with 2^{224} compression function evaluations and 2^{128} memory.

ePrint: https://eprint.iacr.org/2009/443

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .