2015
DOI: 10.1007/978-3-319-16745-9_18
|View full text |Cite
|
Sign up to set email alerts
|

Boomerang Attack on Step-Reduced SHA-512

Abstract: Abstract. SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack. Boomerang distinguisher on SHA-512 compression function reduced to 48 steps is proposed, with a practical complexity of 2 51 . A practical example of the distinguisher for 48-step SHA-512 is also given. As far as we know, it is the best … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…Recently, Eichlseder et al [9] demonstrated how to extend these attacks to get semi-free-start collisions for SHA-512 reduced to 38 steps with practical complexity. Furthermore, second-order differential collisions for SHA-512 up to 48 steps with practical complexity have been shown by Yu et al [27]. We want to note that all these practical collision attacks on SHA-512 are also applicable to its truncated variants.…”
Section: Related Workmentioning
confidence: 85%
See 2 more Smart Citations
“…Recently, Eichlseder et al [9] demonstrated how to extend these attacks to get semi-free-start collisions for SHA-512 reduced to 38 steps with practical complexity. Furthermore, second-order differential collisions for SHA-512 up to 48 steps with practical complexity have been shown by Yu et al [27]. We want to note that all these practical collision attacks on SHA-512 are also applicable to its truncated variants.…”
Section: Related Workmentioning
confidence: 85%
“…Starting from the ground-breaking results of Wang et al [25,26], the search techniques used for practical collisions have been significantly improved, hitting their current peak in the attacks on SHA-256 [2,19] and SHA-512 [9,27]. In spite of all achieved improvements, the top-level attack strategy has remained essentially the same.…”
Section: Attack Strategymentioning
confidence: 99%
See 1 more Smart Citation