z-logo
open-access-imgOpen Access
Cryptanalysis of the LSH hash functions
Author(s) -
Hao Yonglin
Publication year - 2016
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.1534
Subject(s) - computer science , cryptanalysis , hash function , collision attack , boomerang attack , cryptographic hash function , linear cryptanalysis , computer security , cryptography , double hashing
In this paper, we study the security of the LSH hash functions. We find that the wide‐pipe MD‐structural LSH hash functions apply the 17th PGV scheme which is “backward attackable”. This property equips us with trivial attacks including pseudo‐preimage, free‐start collision, and Type II boomerang. These attacks can never be available to previous MD‐structural hash functions like Skein. We stress that such trivial attacks can only be regarded as distinguishers rather than real threat to the LSH in nowadays' practical applications. But we should still be cautious about the possible malicious use of LSH in specific situations in the future. We also launch 14‐round boomerang attacks on LSH‐512 and LSH‐256 hash functions with complexities 2 308 and 2 242 , respectively. We verify the correctness of our boomerang attacks by giving practical 11‐round boomerang quartets. To the best of our knowledge, these are the first practically verifiable boomerang results on the LSH hash functions. These boomerang results indicate that the round functions of LSH are well designed. Copyright © 2016 John Wiley & Sons, Ltd.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here