technique holds with probability
1
2
because of Birth-
day Paradox. Therefore, success probability of the
attack is
1
2
∗ (2
−8
)∗ |K| =
1
2
. This step has complexity
of about 2
41
computations. This step fixes the mes-
sage words X
10
[even] and X
9
[odd].
Choosing some random values for X
9
[even](and
its corresponding differential pair), ∆A
9
, ∆B
9
and ∆C
9
which are needed for meet in the middle step to force
the value of ∆C
11
to L
⊕
are calculated. We again
apply message modification technique to construct
the target difference. For all modular difference in
L
+
we do a message modification step and check if
∆(C
11
) = L
⊕
. This experiment holds with probabil-
ity of 2
−10
, as the Hamming weight of L
⊕
is 10. The
message modification technique holds with probabil-
ity
1
2
. Therefore, success probability of the attack
is
1
2
∗ (2
−10
) ∗ |L| =
1
2
. This step has complexity of
about 2
41
computations. This step fixes X
10
[odd] and
X
11
[even].
To generate the message difference in 11
th
round
we again apply a message modification techniques.
This step fixes the message word X
12
[even] and
X
11
[odd]. XOR difference and modular difference
by I is interchangeable with probability 1 and the
message modification step succeeds with
1
2
. There-
fore this step succeeds with probability
1
2
and com-
plexity of 2
36.5
evaluation of the compression func-
tion.(Mendel and Rijmen, 2007)
4.2 Constructing the Message Word
The attack fixes the words X
6
to X
12
and X
13
[odd].
To compute the values of the message word X
8
to X
15
we choose random value for X
13
[even].
From our known values we can calculate X
14
and
X
15
from the following equations: X
14
= (X
6
−
(X
13
⊕ X
12
⊕ (¬(X
12
+ (X
11
⊕ (¬X
10
≫ 23))) ≫
23))) + X
13
, and X
15
= (X
7
⊕ (X
14
− X
13
)) − (X
14
⊕
0123456789ABCDEF) ≫ 23))) + X
13
. After know-
ing the values of X
8
. . . X
15
we run the inverse key
schedule operation of Tiger to compute X
0
to X
7
.
4.3 Constructing the Initial Values of
State Variables
After knowing the values of X
0
to X
7
we can run Tiger
rounds in backward direction to get the initial values.
As the valuesof A
8
, B
8
, C
8
are knownwe can calculate
the values of A
−1
, B
−1
, C
−1
by backward propagation.
To cancel out the message differences ∆X
0
we apply
an initial value difference ∆C
−1
= I.
5 CONCLUSIONS
In this paper we have identified a new key sched-
ule differential for the Tiger hash function. We have
shown how the key schedule differentials can be ap-
plied to obtain a 1-bit pseudo near collision attack of
complexity of 2
47
for full round Tiger. Finding of a
new key schedule differential for 1-bit pseudo near
collision attack shows security margins of Tiger is not
as high as it was expected.
REFERENCES
Anderson, R. J. and Biham, E. (1996). Tiger: A fast new
hash function. In Gollmann, D., editor, FSE, volume
1039 of LNCS, pages 89–97. Springer.
Dobbertin, H. (1998). Cryptanalysis of md4. J. Cryptology,
11(4):253–271.
Kelsey, J. and Lucks, S. (2006). Collisions and near-
collisions for reduced-round tiger. In FSE, volume
4047 of LNCS, pages 111–125. Springer.
Mendel, F., Preneel, B., Rijmen, V., Yoshida, H., and
Watanabe, D. (2006). Update on tiger. In IN-
DOCRYPT, pages 63–79.
Mendel, F. and Rijmen, V. (2007). Cryptanalysis of the tiger
hash function. In Kurosawa, K., editor, ASIACRYPT,
volume 4833 of LNCS, pages 536–550. Springer.
Rivest, R. L. (1990). The md4 message digest algorithm. In
Menezes, A. and Vanstone, S. A., editors, CRYPTO,
volume 537 of LNCS, pages 303–311. Springer.
Yu, H. and Wang, X. (2007). Multi-collision attack on
the compression functions of md4 and 3-pass haval.
In Nam, K.-H. and Rhee, G., editors, ICISC, volume
4817 of LNCS, pages 206–226. Springer.
SECRYPT 2010 - International Conference on Security and Cryptography
430