RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika. Supplement // Archive

Prikl. Diskr. Mat. Suppl., 2012 Issue 5, Pages 43–44 (Mi pdma22)

This article is cited in 1 paper

Mathematical Methods of Cryptography and Steganography

Estimates of collision resistance complexity for the hash function RIPEMD

G. A. Karpunina, E. Z. Ermolaevab

a Faculty of Computational Mathematics and Cybernetics, M. V. Lomonosov Moscow State University, Moscow
b Moscow

Abstract: In 2005, Wang et al. developed practical collision attacks on MD4 and RIPEMD hash functions. For RIPEMD however, description of the attack has been presented only at ideological level, raising concerns about the attack complexity claimed by the authors. X. Wang et al. stated that the attack complexity is about $2^{18}$ calls of compression function. In this paper, the omitted details of the Wang attack on RIPEMD hash function are recovered and the single-step message modification being the first stage of this attack is implemented. The experiments showed that the lower bound of the average complexity of the Wang's attack is greater than $2^{32,49}$ compression function calls. This estimation is significantly higher than the one stated in the Wang's paper.

UDC: 519.7+004.056.2+004.056.53



© Steklov Math. Inst. of RAS, 2024