IACR Transactions on Symmetric Cryptology (Dec 2016)

Cryptanalysis of Haraka

  • Jérémy Jean

DOI
https://doi.org/10.13154/tosc.v2016.i1.1-12

Abstract

Read online

In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function evaluations. Second, we invalidate the preimage security claim for Haraka-512/256 with an attack finding one preimage in about 2192 function evaluations. These attacks are possible thanks to symmetries in the internal state that are preserved over several rounds.

Keywords