Projekte pro Jahr
Abstract
The most successful attacks on cryptographic hash functions are based
on differential cryptanalysis, where the main problem is to find a differential char-
acteristic. Finding a differential characteristic is equivalent to solving a system
of nonlinear equations. Solving these equations is usually done by a guess-and-
determine approach. Recently, automated tools performing a guess-and-determine
approach based on the concept of generalized conditions have been used to attack
many hash functions. The core part of such tools is the propagation of informa-
tion. In this paper, we propose a new approach to propagate information for affine
functions and compare it to the approach used in recent hash function attacks.
We apply our method to the linear functions σi and Σi used in SHA-2 and to the
linear layer of SHA-3. We show that our approach performs much better than the
previously used methods.
on differential cryptanalysis, where the main problem is to find a differential char-
acteristic. Finding a differential characteristic is equivalent to solving a system
of nonlinear equations. Solving these equations is usually done by a guess-and-
determine approach. Recently, automated tools performing a guess-and-determine
approach based on the concept of generalized conditions have been used to attack
many hash functions. The core part of such tools is the propagation of informa-
tion. In this paper, we propose a new approach to propagate information for affine
functions and compare it to the approach used in recent hash function attacks.
We apply our method to the linear functions σi and Σi used in SHA-2 and to the
linear layer of SHA-3. We show that our approach performs much better than the
previously used methods.
Originalsprache | englisch |
---|---|
Titel | International Workshop on Coding and Cryptography |
Seiten | 193-202 |
Publikationsstatus | Veröffentlicht - 2013 |
Veranstaltung | 2013 International Workshop on Coding and Cryptography: WCC2 013 - Bergen, Norwegen Dauer: 15 Apr. 2013 → 19 Apr. 2013 |
Konferenz
Konferenz | 2013 International Workshop on Coding and Cryptography |
---|---|
Kurztitel | WCC2 013 |
Land/Gebiet | Norwegen |
Ort | Bergen |
Zeitraum | 15/04/13 → 19/04/13 |
Fields of Expertise
- Information, Communication & Computing
Fingerprint
Untersuchen Sie die Forschungsthemen von „Linear Propagation in Efficient Guess-and-Determine Attacks“. Zusammen bilden sie einen einzigartigen Fingerprint.Projekte
- 2 Abgeschlossen
-
FWF -ReSIT - Umsetzung eines sicheren Internets der Dinge
Hutter, M., Wenger, E., Schmidt, J., Mendel, F., Mangard, S. & Posch, R.
1/07/12 → 31/05/16
Projekt: Forschungsprojekt
-
Cryptography
Schläffer, M., Oswald, M. E., Lipp, P., Dobraunig, C. E., Mendel, F., Eichlseder, M., Nad, T., Posch, R., Lamberger, M., Rijmen, V. & Rechberger, C.
1/01/95 → 31/01/19
Projekt: Arbeitsgebiet