Collisions and Other Non-random Properties for Step-Reduced SHA-256

作者: Sebastiaan Indesteege , Florian Mendel , Bart Preneel , Christian Rechberger

DOI: 10.1007/978-3-642-04159-4_18

关键词: Hash functionComputer securityCollisionMathematicsCollision attackAlgorithmFunction (mathematics)Compression (functional analysis)

摘要: … In the light of previous break-through results on hash functions such as MD5 and SHA-1, the security of their successors, SHA-256 and sisters, against all kinds of cryptanalytic attacks …

参考文章(21)
Somitra Kumar Sanadhya, Palash Sarkar, Attacking reduced round SHA-256 applied cryptography and network security. pp. 130- 143 ,(2008) , 10.1007/978-3-540-68914-0_8
Helger Lipmaa, Johan Wallén, Philippe Dumas, On the Additive Differential Probability of Exclusive-Or fast software encryption. pp. 317- 331 ,(2004) , 10.1007/978-3-540-25937-4_20
Somitra Kumar Sanadhya, Palash Sarkar, New local collisions for the SHA-2 hash family international conference on information security and cryptology. pp. 193- 205 ,(2007) , 10.1007/978-3-540-76788-6_16
Somitra Kumar Sanadhya, Palash Sarkar, 22-Step Collisions for SHA-2 arXiv: Cryptography and Security. ,(2008)
Christian Rechberger, Vincent Rijmen, Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Analysis of simplified variants of SHA-256 Science & Engineering Faculty. pp. 123- 134 ,(2005)
Philip Hawkes, Gregory G. Rose, Michael Paddon, On Corrective Patterns for the SHA-2 Family. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 207- ,(2004)
Ivica Nikolić, Alex Biryukov, Collisions for Step-Reduced SHA-256 fast software encryption. pp. 1- 15 ,(2008) , 10.1007/978-3-540-71039-4_1
Somitra Kumar Sanadhya, Palash Sarkar, Non-linear Reduced Round Attacks against SHA-2 Hash Family Information Security and Privacy. pp. 254- 266 ,(2008) , 10.1007/978-3-540-70500-0_19
Xucjia Lai, James L. Massey, Hash functions based on block ciphers theory and application of cryptographic techniques. pp. 55- 70 ,(1992) , 10.1007/3-540-47555-9_5
Florent Chabaud, Antoine Joux, Differential Collisions in SHA-0 international cryptology conference. pp. 56- 71 ,(1998) , 10.1007/BFB0055720