Cryptanalysis of 3-pass HAVAL

23Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

HAVAL is a cryptographic hash function proposed in 1992 by Zheng, Pieprzyk and Seberry. Its has a structure that is quite similar to other well-known hash functions such as MD4 and MD5. The specification of HAVAL includes a security parameter: the number of passes (that is, the number of times that a particular word of the message is used in the computation) can be chosen equal to 3, 4 or 5. In this paper we describe a practical attack that finds collisions for the 3-pass version of HAVAL. This means that it is possible to generate pairs of messages hashing to the same value. The computational complexity of the attack corresponds to about 229 computations of the compression function of 3-pass HAVAL; the required amount of memory is negligible. © International Association for Cryptologic Research 2003.

Cite

CITATION STYLE

APA

Van Rompay, B., Biryukov, A., Preneel, B., & Vandewalle, J. (2003). Cryptanalysis of 3-pass HAVAL. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2894, 228–245. https://doi.org/10.1007/978-3-540-40061-5_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free