Projekte pro Jahr
Abstract
In this work, we introduce a new non-random property for hash/compression functions using the theory of higher order differentials. Based on this, we show a second-order differential collision for the compression function of SHA-256 reduced to 47 out of 64 steps with practical complexity. We have implemented the attack and provide an example. Our results suggest that the security margin of SHA-256 is much lower than the security margin of most of the SHA-3 finalists in this setting. The techniques employed in this attack are based on a rectangle/boomerang approach and cover advanced search algorithms for good characteristics and message modification techniques. Our analysis also exposes flaws in all of the previously published related-key rectangle attacks on the SHACAL-2 block cipher, which is based on SHA-256. We provide valid rectangles for 48 steps of SHACAL-2
Originalsprache | englisch |
---|---|
Titel | Advances in Cryptology - ASIACRYPT 2011 |
Redakteure/-innen | Dong Hoon Lee, Xiaoyun Wang |
Herausgeber (Verlag) | Springer |
Seiten | 270-287 |
ISBN (Print) | 978-3-642-25384-3 |
DOIs | |
Publikationsstatus | Veröffentlicht - 2011 |
Veranstaltung | International Conference on the Theory and Application of Cryptology and Information Security - Seoul, Südkorea Dauer: 4 Dez. 2011 → 8 Dez. 2011 |
Publikationsreihe
Name | Lecture Notes in Computer Science |
---|---|
Band | 7073 |
Konferenz
Konferenz | International Conference on the Theory and Application of Cryptology and Information Security |
---|---|
Land/Gebiet | Südkorea |
Ort | Seoul |
Zeitraum | 4/12/11 → 8/12/11 |
Fields of Expertise
- Information, Communication & Computing
Fingerprint
Untersuchen Sie die Forschungsthemen von „Second-Order Differential Collisions for Reduced SHA-256“. Zusammen bilden sie einen einzigartigen Fingerprint.Projekte
- 3 Abgeschlossen
-
FWF - kryptographische Hashfu - Analyse von modernen kryptographischen Hashfunktionen II
Nad, T., Mendel, F., Schläffer, M., Lamberger, M. & Rijmen, V.
1/02/10 → 31/01/13
Projekt: Forschungsprojekt
-
EU - ECRYPT II - European network of excellence in cryptology - Phase II
Schmidt, J., Nad, T., Kirschbaum, M., Feldhofer, M., Schläffer, M., Aigner, M. J., Rechberger, C., Lamberger, M., Tillich, S., Medwed, M., Hutter, M., Rijmen, V., Mendel, F. & Posch, R.
1/08/08 → 31/07/12
Projekt: Forschungsprojekt
-
Cryptography
Schläffer, M., Oswald, M. E., Lipp, P., Dobraunig, C. E., Mendel, F., Eichlseder, M., Nad, T., Posch, R., Lamberger, M., Rijmen, V. & Rechberger, C.
1/01/95 → 31/01/19
Projekt: Arbeitsgebiet