[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13]

Journal of Information Science and Engineering, Vol. 34 No. 3, pp. 733-748

Cryptanalysis of the Round-Reduced Kupyna

1Department of Mathematics and Computer Science
2Key Lab of Information Security of Network Systems
Fuzhou University
Fuzhou, 350108 P.R. China

3Henan Engineering Laboratory for Big Data Statistical Analysis and Optimal Control
Henan Normal University
Xinxiang, 453007 P.R. China
E-mail: {fzuzoujian15; dongle127}@163.com

  Kupyna was approved as the new Ukrainian hash standard in 2015. In this paper, we show several pseudo-preimage attacks and collision attacks on Kupyna. Due to the wide-pipe design, it is hard to construct pseudo-preimage attacks on Kupyna. Combining the meet-in-the-middle attack with the guess-and-determine technique, we propose some pseudo-preimage attacks on the compression function for 5-round Kupyna-256 and 7-round Kupyna-512. The complexities of these two pseudo-preimage attacks are 2229.5 (for 5-round Kupyna-256) and 2499 (for 7-round Kupyna-512) respectively. Regarding the collision attack, we can not only construct a collision attack on the 7-round Kupyna-512 compression function with a complexity of 2159.3, but also construct a collision attack on the 5-round Kupyna-512 hash function with a complexity of 2240.

Keywords: Kupyna, pseudo-preimage, collision, rebound attack, meet-in-the-middle

  Retrieve PDF document (JISE_201803_10.pdf)