Tongxin xuebao (Feb 2014)
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
Abstract
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2254and 2125respectively. Therefore, the 29-step SM3 hash function is not immune to preimage and pseudo-collision attack.