International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Cryptanalysis of Haraka

Authors:
Jérémy Jean , ANSSI Crypto Lab, Paris
Download:
DOI: 10.13154/tosc.v2016.i1.1-12
URL: http://tosc.iacr.org/index.php/ToSC/article/view/531
Search ePrint
Search Google
Abstract: In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function evaluations. Second, we invalidate the preimage security claim for Haraka-512/256 with an attack finding one preimage in about 2192 function evaluations. These attacks are possible thanks to symmetries in the internal state that are preserved over several rounds.
BibTeX
@article{tosc-2016-28117,
  title={Cryptanalysis of Haraka},
  journal={IACR Trans. Symmetric Cryptol.},
  publisher={Ruhr-Universität Bochum},
  volume={2016, Issue 1},
  pages={1-12},
  url={http://tosc.iacr.org/index.php/ToSC/article/view/531},
  doi={10.13154/tosc.v2016.i1.1-12},
  author={Jérémy Jean},
  year=2016
}