2009
DOI: 10.1007/978-3-642-02620-1_13
|View full text |Cite
|
Sign up to set email alerts
|

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…One may note the work announced at the rump session by Yu and Wang [10], which claimed to have found a non-randomness property of SHA-256 reduced to 39 steps. Since the non-randomness property is not included in the security requirements for SHA-3, we do not discuss it in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…One may note the work announced at the rump session by Yu and Wang [10], which claimed to have found a non-randomness property of SHA-256 reduced to 39 steps. Since the non-randomness property is not included in the security requirements for SHA-3, we do not discuss it in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…In this attack framework, the number of queries principally cannot be below 2 n/2 because the birthday attack is used. With the techniques of [17], a series of distinguishing-H attacks on LPMAC were presented against SHA-1, SHA-256, and the RIPEMDfamily [18,19,3,20]. The attack results are summarized in Table 1.…”
Section: Oursmentioning
confidence: 99%
“…Wang et al [17] solved these problems by using the birthday attack to generate a specific difference of an intermediate chaining variables and efficiently detect it only by changing the next message block. Previous distinguishing-H attacks on LPMAC [18,19,3,20] used the similar idea as [17]. As long as the birthday attack is used to generate an intermediate difference, the attack complexity is between 2 n/2 and 2 n .…”
Section: Summary Of Previous Analyses On Mac Algorithmsmentioning
confidence: 99%
“…However, the work of Wang et al [1,2] has shown weaknesses that allow collisions to be computed for these hash functions much faster than by brute force. And Wang et al [3][4][5] have also analyzed the security of modification detection code (MDC) based on these hash functions in detail. Hence there is a rather pressing need to design new hash functions as of today (cf.…”
Section: Introductionmentioning
confidence: 99%