Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family

作者: Somitra Kumar Sanadhya , Palash Sarkar

DOI: 10.1007/978-3-540-85886-7_17

关键词: Differential (infinitesimal)Round functionHash functionSHA-2Path (graph theory)Construct (python library)Discrete mathematicsTheoretical computer scienceComputer scienceCryptanalysis

摘要: Recently, at FSE '08, Nikolic and Biryukov introduced a new technique for analyzing SHA-2 round function. Building on their work, but using other differential paths, we construct two different deterministic attacks against 21-step hash family. Since the are deterministic, they actually combinatorial constructions of collisions. There six free words in our first construction. This gives exactly 2192different collisions SHA-256 2384different SHA-512. The second construction has five words. best previous result, due to Biryukov, finding holds with probability 2i¾? 19. No results SHA-512 previously known. Further, provide evidence that Nikolic-Biryukov path is unlikely yield

参考文章(12)
Somitra Kumar Sanadhya, Palash Sarkar, Attacking reduced round SHA-256 applied cryptography and network security. pp. 130- 143 ,(2008) , 10.1007/978-3-540-68914-0_8
Henri Gilbert, Helena Handschuh, Security Analysis of SHA-256 and Sisters Selected Areas in Cryptography. ,vol. 3006, pp. 175- 193 ,(2004) , 10.1007/978-3-540-24654-1_13
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Somitra Kumar Sanadhya, Palash Sarkar, New local collisions for the SHA-2 hash family international conference on information security and cryptology. pp. 193- 205 ,(2007) , 10.1007/978-3-540-76788-6_16
Ivica Nikolić, Alex Biryukov, Collisions for Step-Reduced SHA-256 fast software encryption. pp. 1- 15 ,(2008) , 10.1007/978-3-540-71039-4_1
Somitra Kumar Sanadhya, Palash Sarkar, Non-linear Reduced Round Attacks against SHA-2 Hash Family Information Security and Privacy. pp. 254- 266 ,(2008) , 10.1007/978-3-540-70500-0_19
Florent Chabaud, Antoine Joux, Differential Collisions in SHA-0 international cryptology conference. pp. 56- 71 ,(1998) , 10.1007/BFB0055720
Gwangsoo Rhee, Kil-Hyun Nam, Information Security and Cryptology - Icisc 2007 ,(2008)
Juris Hartmanis, Bruce Schneier, Jan van Leeuwen, Gerhard Goos, Fast Software Encryption ,(2001)