-------------------------------------------------------------------------- Subject: [CRUNCHY CONTEST] 5 rounds, width 800, collision Date: Mon, 11 Jul 2016 16:35:43 +0800 (GMT+08:00) From: Ling Song To: crypto-competitions at googlegroups com Cc: crunchy at noekeon org, guojian at ntu edu sg, qiaokexin at iie ac cn, meicheng liu at gmail com -------------------------------------------------------------------------- Dear Keccak Team and all, We, Jian, Meicheng, Ling and Kexin, found solutions for collision challenge on Keccak[r=640, c=160, rounds=5], from round 0 to 4. counter += verifyCollisionChallenge( // Keccak[r=640, c=160, rounds=5]: collision challenge 640, 160, 5, 0, // fill in this line with the start round index (0=first) (const UINT8*)"\x3f\xb7\x7d\x29\x6d\xb4\x5f\xce\xab\xd5\xef\x63\xb2\xdb\x75\xab\xe7\x19\x01\x02\x73\x77\x92\x06\xa4\xa6\x45\xa6\xf8\xe3\xe6\x68\x62\x24\x28\x15\x83\xab\x3a\x63\xfb\xa5\xc7\x96\xb5\xbe\x4c\x5e\x96\x4c\x61\x92\xda\x47\x96\xdd\x4f\x09\xb0\xd4\x6f\x37\x68\x4c\x51\x37\xb6\xd3\x56\xab\x86\x62\x52\x7a\x57\xde\x0f\xea\x03\x90", 636, // bit length of message 1 (const UINT8*)"\xcb\x0b\x15\x5b\xfc\xf2\xf3\xc0\xa5\xb5\x07\x59\xc3\x6d\x73\x22\xc5\xf0\x4c\x91\x63\x7d\x47\x87\x49\xa6\x75\xa6\x6f\xa9\xbe\x8b\xe3\x8a\xeb\x52\x41\x2d\x40\x19\xc3\x4c\xfb\xd9\x30\xd6\x9f\x66\x71\xfc\xc9\xd8\x54\x85\x55\x57\x4a\xf6\x62\x06\xc5\xb5\xb4\x64\x56\xbf\x12\x7f\xf0\xdb\xea\x2b\x10\x7b\x20\xf6\x87\x97\xfd\xf2", 638 // bit length of message 2 ); The 160-bit digest is: ba 5a 0b f9 2d 68 30 74 62 8c 66 85 ad b0 e1 66 35 ac 52 b0 Best Regards, Kexin Qiao (2,3,1,4) and Ling Song (1,2,3) and Meicheng Liu (1,2) and Jian Guo (1) 1. Cryptanalysis Taskforce, Temasek Laboratories @ Nanyang Technological University, Singapore 2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China 3. Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China 4. University of Chinese Academy of Sciences, China Dear Keccak Team and all, We, Jian, Meicheng, Ling and Kexin, found solutions for collision challenge on Keccak[r=1440, c=160, rounds=5], from round 0 to 4. counter += verifyCollisionChallenge( // Keccak[r=1440, c=160, rounds=5]: collision challenge 1440, 160, 5, 0, (const UINT8*)"\x40\xe7\x97\xea\x27\xe9\x33\x80\x52\x95\x9a\x80\xb9\xe7\xe9\x36\xcc\x5b\x37\xfb\x6c\xcd\xc9\xba\x54\xe1\xd6\xd6\xe6\x68\x3b\x0e\x31\x5c\x0d\xfd\xb3\x23\x5a\xfa\xe0\x76\x6c\xba\x07\x63\xe4\xe7\x4c\x82\xf0\xa8\x5c\x51\x9d\xd2\x09\xe0\xa5\x2e\x47\x5f\x6d\x0d\xed\xb8\x43\x09\x3f\xfc\x0c\x80\x42\xed\xd5\xf3\xbb\x7a\xe3\xd2\x03\xa7\x94\x56\x5d\x1e\x06\x65\x37\x1f\x10\xf1\x6f\xf7\x6e\xe8\xf8\xc9\x93\x4c\x0a\x0b\x18\xf9\x9c\x2a\xcb\x3c\x94\x9f\x98\x4c\xc2\xa4\xae\x62\x0a\x1d\x74\xd1\x20\xff\xf0\x19\x2a\x18\xee\x48\x1c\xef\x9a\xd5\x6c\xea\x88\x58\x72\x6b\x00\xa5\xb3\x99\xee\x41\xe8\x48\x70\x4b\xdc\xc8\xd1\xfc\x56\x8a\x72\xf2\x28\xb9\xc4\x03\xa6\xd5\x1c\xd4\x04\xe3\x53\x55\xf9\xae\x7f\x5c\x02\x92\x7f\x1d\xde\xa1\x58\xe3", 1438, (const UINT8*)"\xac\xfc\xac\x2a\x24\xee\x6d\x36\xdd\x0d\xca\x37\xb7\x2d\xcd\xf1\x51\x7a\xd5\x69\xdb\x44\xe9\x45\x8b\xf3\x55\x21\xd6\xbd\x99\xef\x16\x0d\xc0\x1e\x58\x91\x7e\xea\x7d\x03\x89\x22\xb3\x46\x04\x34\x6d\xc0\xdf\x93\xac\xa5\xea\x86\xdb\x26\xc9\xf4\x8b\x6b\x68\xcf\x40\x58\x36\xad\xeb\x3f\x4f\xe0\xc3\x48\xc3\xb4\xca\x0f\xa2\xd2\x7b\x99\x30\x47\x7b\x47\xc3\x4d\x57\x86\xd2\x9a\x97\xd2\x89\xf5\xac\x03\xd9\x11\xcc\x4f\x46\x39\xd0\xea\x8b\xea\x1c\x7d\x45\xdd\x5a\xb9\xbc\x6e\x57\x64\xae\xd5\xcf\xe3\x60\xd9\xdb\x7b\xe2\xa0\x7a\x6c\xf1\xff\x0b\x53\x0a\x5b\x2f\x4d\xdb\x4c\x91\xc1\xe0\x17\xdc\x88\x59\x25\x5c\x51\x95\x76\xcc\xdb\x30\xfa\x62\x9f\xc3\x02\x9d\x68\x39\x2c\x23\xd5\x08\xbd\x1e\x2c\xdc\x2d\x3e\xef\xb9\x66\xc4\x1b\x31\x9a", 1436 ); The 160-bit digest is: a6 9d a1 ee 0f 0f 08 33 c4 3f f4 d4 1b fa 80 a8 1d a0 df ac We will later write a paper to explain the methods of how we find it. Best Regards, Kexin Qiao (2,3,1,4) and Ling Song (1,2,3) and Meicheng Liu (1,2) and Jian Guo (1) 1. Cryptanalysis Taskforce, Temasek Laboratories @ Nanyang Technological University, Singapore 2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China 3. Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China 4. University of Chinese Academy of Sciences, China