Finding SHA-1 characteristics: general results and applications

作者: Christophe De Cannière , Christian Rechberger

DOI: 10.1007/11935230_1

关键词: Search treeSearch algorithmBlock cipherComputer scienceCryptographyAlgorithmCollisionProof of conceptHash functionSHA-1

摘要: The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for in an automatic way. This is particularly useful multi-block attacks, and as proof concept, give two-block 64-step SHA-1 based new characteristic. highest number steps was published 58. We also unified view expected work factor needed degrees freedom search, facilitates optimization.

参考文章(23)
Hideki Imai, Mitsuru Kawazoe, Makoto Sugita, Gröbner Basis Based Cryptanalysis of SHA-1. IACR Cryptology ePrint Archive. ,vol. 2006, pp. 98- ,(2006)
Charanjit S. Jutla, Anindya C. Patthak, Provably good codes for hash function design international conference on selected areas in cryptography. pp. 376- 393 ,(2006) , 10.1007/978-3-540-74462-7_26
Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta, Improved Collision Attack on MD4 with Probability Almost 1 Information Security and Cryptology - ICISC 2005. pp. 129- 145 ,(2006) , 10.1007/11734727_12
Norbert Pramstaller, Christian Rechberger, Vincent Rijmen, Exploiting Coding Theory for Collision Attacks on SHA-1 Cryptography and Coding. ,vol. 3796, pp. 78- 95 ,(2005) , 10.1007/11586821_7
Vincent Rijmen, Elisabeth Oswald, Update on SHA-1 Lecture Notes in Computer Science. pp. 58- 71 ,(2005) , 10.1007/978-3-540-30574-3_6
Martin Schläffer, Elisabeth Oswald, Searching for differential paths in MD4 fast software encryption. pp. 242- 261 ,(2006) , 10.1007/11799313_16
Kazuo Ohta, Yu Sasaki, Noboru Kunihiro, Yusuke Naito, Improved Collision Attack on MD4. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 151- ,(2005)
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu, Cryptanalysis of the hash functions MD4 and RIPEMD theory and application of cryptographic techniques. pp. 1- 18 ,(2005) , 10.1007/11426639_1
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, Finding collisions in the full SHA-1 international cryptology conference. pp. 17- 36 ,(2005) , 10.1007/11535218_2
John Black, Martin Cochran, Trevor Highland, A study of the MD5 attacks: insights and improvements fast software encryption. pp. 262- 277 ,(2006) , 10.1007/11799313_17