Projects per year
Abstract
In this paper, we examine the resistance of the popular hash function SHA-1 and its predecessor SHA-0 against dedicated preimage attacks. In order to assess the security margin of these hash functions against these attacks, two new cryptanalytic techniques are developed:
Reversing the inversion problem: the idea is to start with an impossible expanded message that would lead to the required digest, and then to correct this message until it becomes valid without destroying the preimage property.
P3graphs: an algorithm based on the theory of random graphs that allows the conversion of preimage attacks on the compression function to attacks on the hash function with less effort than traditional meet-in-the-middle approaches.
Combining these techniques, we obtain preimage-style shortcuts attacks for up to 45 steps of SHA-1, and up to 50 steps of SHA-0 (out of 80)
Reversing the inversion problem: the idea is to start with an impossible expanded message that would lead to the required digest, and then to correct this message until it becomes valid without destroying the preimage property.
P3graphs: an algorithm based on the theory of random graphs that allows the conversion of preimage attacks on the compression function to attacks on the hash function with less effort than traditional meet-in-the-middle approaches.
Combining these techniques, we obtain preimage-style shortcuts attacks for up to 45 steps of SHA-1, and up to 50 steps of SHA-0 (out of 80)
Original language | English |
---|---|
Title of host publication | Advances in Cryptology - Proceedings CRYPTO 2008 |
Editors | David Wagner |
Publisher | Springer |
Pages | 179-202 |
ISBN (Print) | 978-3-540-85173-8 |
DOIs | |
Publication status | Published - 2008 |
Event | 28th Annual International Cryptology Conference: CRYPTO 2008 - Santa Barbara, United States Duration: 17 Aug 2008 → 21 Aug 2008 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Publisher | Springer |
Volume | 5157 |
Conference
Conference | 28th Annual International Cryptology Conference |
---|---|
Abbreviated title | CRYPTO 2008 |
Country/Territory | United States |
City | Santa Barbara |
Period | 17/08/08 → 21/08/08 |
Fingerprint
Dive into the research topics of 'Preimages for Reduced SHA-0 and SHA-1'. Together they form a unique fingerprint.Projects
- 2 Finished
-
FWF - Kryptoanalyse - Cryptanalysis by means of numerical methods
Mendel, F., Nad, T., Lamberger, M., Rechberger, C., Schläffer, M. & Rijmen, V.
1/10/07 → 31/12/09
Project: Research project
-
Cryptography
Schläffer, M., Oswald, M. E., Lipp, P., Dobraunig, C. E., Mendel, F., Eichlseder, M., Nad, T., Posch, R., Lamberger, M., Rijmen, V. & Rechberger, C.
1/01/95 → 31/01/19
Project: Research area