Non-linear Reduced Round Attacks against SHA-2 Hash Family

作者: Somitra Kumar Sanadhya , Palash Sarkar

DOI: 10.1007/978-3-540-70500-0_19

关键词:

摘要: Most of the attacks against (reduced) SHA-2 family in literature have used local collisions which are valid for linearized version hash functions. Recently, at FSE '08, an attack reduced round SHA-256 was presented by Nikolic and Biryukov a collision is actual function. It 9-step starts introducing modular difference 1 two messages. succeeds with probability roughly 1/3. We build on work provide generalized nonlinear accepts arbitrary initial message difference. This 1. Using this we present 18-step SHA-512 Both these succeed then special cases our show different differential paths attacking 20-step SHA-512. One same as while other one new path. Messages following both can be found improves previous result where success Finally, 21-step SHA-512, The probabilities 2? 15and 17which improve having 19reported earlier. examples pairs all up to SHA-256. also first real colliding

参考文章(11)
Somitra Kumar Sanadhya, Palash Sarkar, Attacking reduced round SHA-256 applied cryptography and network security. pp. 130- 143 ,(2008) , 10.1007/978-3-540-68914-0_8
Somitra Kumar Sanadhya, Palash Sarkar, New local collisions for the SHA-2 hash family international conference on information security and cryptology. pp. 193- 205 ,(2007) , 10.1007/978-3-540-76788-6_16
Philip Hawkes, Gregory G. Rose, Michael Paddon, On Corrective Patterns for the SHA-2 Family. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 207- ,(2004)
Ivica Nikolić, Alex Biryukov, Collisions for Step-Reduced SHA-256 fast software encryption. pp. 1- 15 ,(2008) , 10.1007/978-3-540-71039-4_1
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, Finding collisions in the full SHA-1 international cryptology conference. pp. 17- 36 ,(2005) , 10.1007/11535218_2
Florent Chabaud, Antoine Joux, Differential Collisions in SHA-0 international cryptology conference. pp. 56- 71 ,(1998) , 10.1007/BFB0055720
Xiaoyun Wang, Hongbo Yu, How to break MD5 and other hash functions theory and application of cryptographic techniques. pp. 19- 35 ,(2005) , 10.1007/11426639_2
Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin, Efficient collision search attacks on SHA-0 international cryptology conference. pp. 1- 16 ,(2005) , 10.1007/11535218_1
Helena Handschuh, Henri Gilbert, Security analysis of SHA-256 and sisters Lecture Notes in Computer Science. pp. 175- 193 ,(2004)
Christian Rechberger, Vincent Rijmen, Florian Mendel, Norbert Pramstaller, Analysis of Step-Reduced SHA-256. IACR Cryptology ePrint Archive. ,vol. 2008, pp. 130- ,(2008)