Tongxin xuebao (Feb 2014)

Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

  • Gao-li WANG,
  • Yan-zhao SHEN

Journal volume & issue
Vol. 35
pp. 40 – 45

Abstract

Read online

The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented. The time complexities are 2254and 2125respectively. Therefore, the 29-step SM3 hash function is not immune to preimage and pseudo-collision attack.

Keywords