Cryptanalysis of Haraka
DOI:
https://doi.org/10.13154/tosc.v2016.i1.1-12Keywords:
Hash Function, Preimage Attack, Collision Attack, HarakaAbstract
In this paper, we describe attacks on the recently proposed Haraka hashfunctions. First, for the two hash functions Haraka-256/256 and Haraka-512/256
in the family, we show how two colliding messages can be constructed in about
216 function evaluations. Second, we invalidate the preimage security claim for
Haraka-512/256 with an attack finding one preimage in about 2192 function
evaluations. These attacks are possible thanks to symmetries in the internal state
that are preserved over several rounds.
Published
2016-12-01
Issue
Section
Articles
License
Copyright (c) 2016 Jérémy Jean
This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
Cryptanalysis of Haraka. (2016). IACR Transactions on Symmetric Cryptology, 2016(1), 1-12. https://doi.org/10.13154/tosc.v2016.i1.1-12