2006
DOI: 10.1007/11935230_2
|View full text |Cite
|
Sign up to set email alerts
|

Improved Collision Search for SHA-0

Abstract: Abstract. At CRYPTO2005, Xiaoyun Wang, Hongbo Yu and Yiqun Lisa Yin proposed a collision attack on SHA-0 that could generate a collision with complexity 2 39 SHA-0 hash operations. Although the method of Wang et al. can find messages that satisfy the sufficient conditions in steps 1 to 20 by using message modification, it makes no mention of the message modifications needed to yield satisfaction of the sufficient conditions in steps 21 and onwards.In this paper, first, we give sufficient conditions for the ste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2006
2006
2010
2010

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 7 publications
0
15
0
Order By: Relevance
“…A hint towards the reasons for the withdrawal came in 1998 with a paper [31] by Chabaud and Joux, describing a collision attack on SHA-0. Other cryptanalytic results on SHA-0 appear in [16,17,30,139,217]. One of only a few published implementations of collision attacks on SHA-0 was developed by the author and can be found at [203]; this implementation is based on the attack described in [217].…”
Section: Sha-0mentioning
confidence: 99%
“…A hint towards the reasons for the withdrawal came in 1998 with a paper [31] by Chabaud and Joux, describing a collision attack on SHA-0. Other cryptanalytic results on SHA-0 appear in [16,17,30,139,217]. One of only a few published implementations of collision attacks on SHA-0 was developed by the author and can be found at [203]; this implementation is based on the attack described in [217].…”
Section: Sha-0mentioning
confidence: 99%
“…This includes message modifications [27], neutral bits [7], boomerang attacks [16,20], tunnels [18] and submarine modifications [21]. In this section we show that the problem of finding conforming message pairs can be reformulated as finding preimages of zero under a function which we call the condition function.…”
Section: Finding a Conforming Message Pair Efficientlymentioning
confidence: 99%
“…In the case of SHA-0 the overall complexity of the attack was 2 39 message modification processes. Recently, Naito et al [18] lower this complexity down to 2 36 operations, but we argue in this paper that it is a theoretical complexity and not a measured one.…”
Section: Concerning the Domain Extensionmentioning
confidence: 58%
“…Naito et al recently proposed [18] a new advanced modification technique socalled submarine modification. Its purpose is to ensure that the sufficient conditions from steps 21 to 24 are fulfilled.…”
Section: Naito Et Almentioning
confidence: 99%
See 1 more Smart Citation