Cryptanalysis of Haraka
2016 ◽
pp. 1-12
◽
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function evaluations. Second, we invalidate the preimage security claim for Haraka-512/256 with an attack finding one preimage in about 2192 function evaluations. These attacks are possible thanks to symmetries in the internal state that are preserved over several rounds.
2010 ◽
Vol 47
(1)
◽
pp. 115-135
◽
Keyword(s):
Keyword(s):
2018 ◽
Vol 2
(1)
◽
pp. 21
2020 ◽
pp. 88-131
◽
Keyword(s):
2000 ◽
Vol 41
(1)
◽
pp. 133-136
1988 ◽
Vol 62
(03)
◽
pp. 419-423
◽
Keyword(s):