2009
DOI: 10.1007/978-3-642-04159-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Collisions and Other Non-random Properties for Step-Reduced SHA-256

Abstract: Abstract.We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision attacks on SHA-256 reduced to 23 and 24 steps with complexities 2 18 and 2 28.5 , respectively. We give example colliding message pairs for 23-step and 24-step SHA-256. The best previous, recently obtained result was a collision attack for up to 22 steps. We extend our attacks to 23 and 24-step reduced SHA-512 with respective complexities of 2 44.9 and 2 53.0 . Additionally, we show nonrandom behaviour … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
40
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 39 publications
(41 citation statements)
references
References 13 publications
0
40
0
Order By: Relevance
“…The best collision attacks so far are extensions of [31]. Indesteege et al [13] and Sanadhya and Sarkar [33], both presented collision attacks for 24 steps. We want to note that in contrast to the preimage attacks all these attacks are of practical complexity.…”
Section: Application To Sha-256mentioning
confidence: 99%
See 1 more Smart Citation
“…The best collision attacks so far are extensions of [31]. Indesteege et al [13] and Sanadhya and Sarkar [33], both presented collision attacks for 24 steps. We want to note that in contrast to the preimage attacks all these attacks are of practical complexity.…”
Section: Application To Sha-256mentioning
confidence: 99%
“…Apart from being marked as 'relying on the same design principle as SHA-1 and MD5', the best attack to date on SHA-256 is a collision attack for 24 out of 64 steps with practical complexity [13,33] and a preimage attack on 45 steps [18] having a complexity of 2 255.5 . Higher-order differentials have been introduced by Lai in [21] and first applied to block ciphers by Knudsen in [20].…”
Section: Introductionmentioning
confidence: 99%
“…In particular, the work by Nikolić and Biryukov improved the collision techniques [6]. The best collision attacks so far are the ones proposed by Indesteege et al [7] and Sanadhya and Sarkar [8], both describing collision attacks for 24 steps. The only analysis of preimage resistance we are aware of is a recent attack on 24 steps of SHA-2 due to Isobe and Shibutani [9].…”
Section: Introductionmentioning
confidence: 99%
“…Then in [25] Nikolić and Biryukov improved the collision techniques and constructed a practical collision for 21 steps and a semi-free-start collision for 23 steps of SHA-256. This was later extended to 24 steps on SHA-256 and SHA-512 by Sanadhya and Sarkar [26], and Indesteege et al [11]. Then Mendel et al improved the semi-free-start collisions on SHA-256 from 24 to 32 steps and gave a collision attack for 27 steps, which are all practical [19].…”
Section: Introductionmentioning
confidence: 99%
“…In [11], Indesteege et al show nonrandom behavior of the SHA-256 compression function in the form of free-start near-collisions for up to 31 steps. In [17], Lamberger and Mendel gave a second-order differential collision on 46 steps of SHA-256 compression function.…”
Section: Introductionmentioning
confidence: 99%