2015
DOI: 10.1007/978-3-662-48800-3_25
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of SHA-512/224 and SHA-512/256

Abstract: In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 on 64-bit platforms, while maintaining the same hash size and claimed security level. So far, no third-party analysis of SHA-512/224 or SHA-512/256 has been published. In this work, we examine the collision resistance of step-reduced versions of SHA-512/224 and SHA-512/256 by using differential cryptanalysis in combination with sophisticated sear… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(20 citation statements)
references
References 21 publications
0
20
0
Order By: Relevance
“…Each hash algorithm produces a fixed length of MD such as 160 for SHA1 and 224, 256, 384, and 512 for SHA2 and SHA3 [50]. Table 1 shows the comparison between SHA1, SHA2, and SHA3 [51].…”
Section: -Sha Familymentioning
confidence: 99%
“…Each hash algorithm produces a fixed length of MD such as 160 for SHA1 and 224, 256, 384, and 512 for SHA2 and SHA3 [50]. Table 1 shows the comparison between SHA1, SHA2, and SHA3 [51].…”
Section: -Sha Familymentioning
confidence: 99%
“…In [7], the authors have proposed a scheme to secure IPv6 address which includes the modifications to the RFC 3972 standard by reducing the granularity factor of a sec from 16 to 8 and replacing RSA with ECC and ECSDSA, using SHA-256 [6] hash function. This method improves the address configuration performance, but it does not eliminate the address conflict.…”
Section: Related Workmentioning
confidence: 99%
“…This paper treats the SLAAC phases and explains the problems associated with them. So, we propose a new algorithm based on SHA-512 [6] in order to optimize IPv6 security in SmObNet6, This paper is organized as follows: Section 2 presents a related work to our field when Section 3 describes some IPv6 functionalities, in particular, the DAD process. Section 4 shows the parameters and methodology following in this work and we present our algorithm in Section 4.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with search algorithms implemented from scratch in general purpose programming languages [17][18][19][20][21][22][23][24], the CP based approach allows the cryptanalysts to state the problem very naturally, and at a high level without having to say how it should be solved. The resolution of the problem is delegated to generic solvers, and therefore decoupled from the formulation of the problem.…”
Section: Introductionmentioning
confidence: 99%