In this paper, we present the first results on the preimage resistance against step-reduced versions of ISO standard hash functions RIPEMD-128 and RIPEMD-160, which were designed as strengthened versions of RIPEMD. While preimage attacks on the first 33 steps and intermediate 35 steps of RIPEMD (48 steps in total) are known, no preimage attack exists on RIPEMD-128 (64 steps) or RIPEMD-160 (80 steps). This paper shows three variations of preimage attacks of RIPEMD-128; the first 33 steps, intermediate 35 steps, and the last 32 steps. Because of the large security margin, full RIPEMD-128 is still enough secure, however, it is interesting that the number of attacked steps for RIPEMD-128 reaches the same level as for RIPEMD. We also show that our approach can be applied to RIPEMD-160, and present preimage attacks on the first 30 steps and the last 31 steps.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Chiaki OHTAHARA, Yu SASAKI, Takeshi SHIMOYAMA, "Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160" in IEICE TRANSACTIONS on Fundamentals,
vol. E95-A, no. 10, pp. 1729-1739, October 2012, doi: 10.1587/transfun.E95.A.1729.
Abstract: In this paper, we present the first results on the preimage resistance against step-reduced versions of ISO standard hash functions RIPEMD-128 and RIPEMD-160, which were designed as strengthened versions of RIPEMD. While preimage attacks on the first 33 steps and intermediate 35 steps of RIPEMD (48 steps in total) are known, no preimage attack exists on RIPEMD-128 (64 steps) or RIPEMD-160 (80 steps). This paper shows three variations of preimage attacks of RIPEMD-128; the first 33 steps, intermediate 35 steps, and the last 32 steps. Because of the large security margin, full RIPEMD-128 is still enough secure, however, it is interesting that the number of attacked steps for RIPEMD-128 reaches the same level as for RIPEMD. We also show that our approach can be applied to RIPEMD-160, and present preimage attacks on the first 30 steps and the last 31 steps.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1587/transfun.E95.A.1729/_p
Copy
@ARTICLE{e95-a_10_1729,
author={Chiaki OHTAHARA, Yu SASAKI, Takeshi SHIMOYAMA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160},
year={2012},
volume={E95-A},
number={10},
pages={1729-1739},
abstract={In this paper, we present the first results on the preimage resistance against step-reduced versions of ISO standard hash functions RIPEMD-128 and RIPEMD-160, which were designed as strengthened versions of RIPEMD. While preimage attacks on the first 33 steps and intermediate 35 steps of RIPEMD (48 steps in total) are known, no preimage attack exists on RIPEMD-128 (64 steps) or RIPEMD-160 (80 steps). This paper shows three variations of preimage attacks of RIPEMD-128; the first 33 steps, intermediate 35 steps, and the last 32 steps. Because of the large security margin, full RIPEMD-128 is still enough secure, however, it is interesting that the number of attacked steps for RIPEMD-128 reaches the same level as for RIPEMD. We also show that our approach can be applied to RIPEMD-160, and present preimage attacks on the first 30 steps and the last 31 steps.},
keywords={},
doi={10.1587/transfun.E95.A.1729},
ISSN={1745-1337},
month={October},}
Copy
TY - JOUR
TI - Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1729
EP - 1739
AU - Chiaki OHTAHARA
AU - Yu SASAKI
AU - Takeshi SHIMOYAMA
PY - 2012
DO - 10.1587/transfun.E95.A.1729
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E95-A
IS - 10
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - October 2012
AB - In this paper, we present the first results on the preimage resistance against step-reduced versions of ISO standard hash functions RIPEMD-128 and RIPEMD-160, which were designed as strengthened versions of RIPEMD. While preimage attacks on the first 33 steps and intermediate 35 steps of RIPEMD (48 steps in total) are known, no preimage attack exists on RIPEMD-128 (64 steps) or RIPEMD-160 (80 steps). This paper shows three variations of preimage attacks of RIPEMD-128; the first 33 steps, intermediate 35 steps, and the last 32 steps. Because of the large security margin, full RIPEMD-128 is still enough secure, however, it is interesting that the number of attacked steps for RIPEMD-128 reaches the same level as for RIPEMD. We also show that our approach can be applied to RIPEMD-160, and present preimage attacks on the first 30 steps and the last 31 steps.
ER -