Preimages for Reduced SHA-0 and SHA-1

Christophe De Cannière, Christian Rechberger

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

In this paper, we examine the resistance of the popular hash function SHA-1 and its predecessor SHA-0 against dedicated preimage attacks. In order to assess the security margin of these hash functions against these attacks, two new cryptanalytic techniques are developed:

Reversing the inversion problem: the idea is to start with an impossible expanded message that would lead to the required digest, and then to correct this message until it becomes valid without destroying the preimage property.

P3graphs: an algorithm based on the theory of random graphs that allows the conversion of preimage attacks on the compression function to attacks on the hash function with less effort than traditional meet-in-the-middle approaches.

Combining these techniques, we obtain preimage-style shortcuts attacks for up to 45 steps of SHA-1, and up to 50 steps of SHA-0 (out of 80)
Original languageEnglish
Title of host publicationAdvances in Cryptology - Proceedings CRYPTO 2008
EditorsDavid Wagner
PublisherSpringer
Pages179-202
ISBN (Print)978-3-540-85173-8
DOIs
Publication statusPublished - 2008
Event28th Annual International Cryptology Conference: CRYPTO 2008 - Santa Barbara, United States
Duration: 17 Aug 200821 Aug 2008

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume5157

Conference

Conference28th Annual International Cryptology Conference
Abbreviated titleCRYPTO 2008
Country/TerritoryUnited States
CitySanta Barbara
Period17/08/0821/08/08

Fingerprint

Dive into the research topics of 'Preimages for Reduced SHA-0 and SHA-1'. Together they form a unique fingerprint.

Cite this