Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1

作者: Kazumaro Aoki , Yu Sasaki

DOI: 10.1007/978-3-642-03356-8_5

关键词: Preimage attackCryptographic hash functionHash functionCollision resistanceSHA-2Message authentication codeComputer scienceTheoretical computer scienceHash-based message authentication codeCollision attack

摘要: Preimage resistance of several hash functions has already been broken by the meet-in-the-middle attacks and they utilize a property that their message schedules consist of only permutations of message words. It is unclear whether this type of attacks is applicable to a hash function whose message schedule does not consist of permutations of message words. This paper proposes new attacks against reduced SHA-0 and SHA-1 hash functions by analyzing a message schedule that does not consist of permutations but linear …

参考文章(22)
Gaëtan Leurent, MD4 is Not One-Way fast software encryption. pp. 412- 428 ,(2008) , 10.1007/978-3-540-71039-4_26
Markku-Juhani O. Saarinen, A Meet-in-the-Middle Collision Attack Against the New FORK-256 Lecture Notes in Computer Science. pp. 10- 17 ,(2007) , 10.1007/978-3-540-77026-8_2
Yu Sasaki, Kazumaro Aoki, Finding Preimages in Full MD5 Faster Than Exhaustive Search international cryptology conference. pp. 134- 152 ,(2009) , 10.1007/978-3-642-01001-9_8
Yu Sasaki, Kazumaro Aoki, A Preimage Attack for 52-Step HAS-160 international conference on information security and cryptology. pp. 302- 317 ,(2009) , 10.1007/978-3-642-00730-9_19
Jean-Philippe Aumasson, Willi Meier, Florian Mendel, Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 selected areas in cryptography. pp. 120- 135 ,(2009) , 10.1007/978-3-642-04159-4_8
Yu Sasaki, Kazumaro Aoki, Preimage Attacks on 3, 4, and 5-Pass HAVAL international conference on the theory and application of cryptology and information security. pp. 253- 271 ,(2008) , 10.1007/978-3-540-89255-7_16
Christophe De Cannière, Christian Rechberger, Preimages for Reduced SHA-0 and SHA-1 international cryptology conference. pp. 179- 202 ,(2008) , 10.1007/978-3-540-85174-5_11
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Kazumaro Aoki, Yu Sasaki, Preimage Attacks on One-Block MD4, 63-Step MD5 and More selected areas in cryptography. pp. 103- 119 ,(2009) , 10.1007/978-3-642-04159-4_7
Josef Pieprzyk, Jennifer Seberry, Yuliang Zheng, HAVAL - A One-Way Hashing Algorithm with Variable Length of Output theory and application of cryptographic techniques. pp. 83- 104 ,(1992)