2021
DOI: 10.1016/j.parco.2021.102804
|View full text |Cite
|
Sign up to set email alerts
|

Computational records with aging hardware: Controlling half the output of SHA-256

Abstract: SHA-256 is a secure cryptographic hash function. As such, its output should not have any detectable property. This paper describes three bit strings whose hashes by SHA-256 are nevertheless correlated in a non-trivial way: the first half of their hashes XORs to zero. They were found by "brute-force", without exploiting any cryptographic weakness in the hash function itself. This does not threaten the security of the hash function and does not have any cryptographic implication.This is an example of a large "co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…The security technologies and compresses them to produce a 256-bit fixed-length hash value which is in a 64-digit hexadecimal number Bensalem et al, 2021;Bouam et al, 2021;Nakamura et al, 2021;Phan et al, 2021;Patra & Patra, 2021).…”
Section: 9mentioning
confidence: 99%
See 1 more Smart Citation
“…The security technologies and compresses them to produce a 256-bit fixed-length hash value which is in a 64-digit hexadecimal number Bensalem et al, 2021;Bouam et al, 2021;Nakamura et al, 2021;Phan et al, 2021;Patra & Patra, 2021).…”
Section: 9mentioning
confidence: 99%
“…Here, the 256-bit hash value is calculated from the 512 bits input message by dividing it into several 512bit data blocks and processing using the compression function one at a time. When the last block is less than 512 bits, padding is added by appending bits until it is 512-bit (Wu et al, 2020;Bouam et al, 2021). In hash computation, a hash value is obtained by repetitive generation of the message schedule, functions, constants, and word operations.…”
Section: 9mentioning
confidence: 99%