2013
DOI: 10.1007/978-3-642-38348-9_16
|View full text |Cite
|
Sign up to set email alerts
|

Improving Local Collisions: New Attacks on Reduced SHA-256

Abstract: In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and show how to turn them into collisions. We present a collision attack on 28 steps of the hash function with practical complexity. Using a two-block approach we are able to turn a semifree-start collision into a collision for 31 steps with a complexity of at most 2 65.5. The main improvement of our work is to extend the size of the local collisions used in these attacks. To construct differential characteristics and confir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
55
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 63 publications
(56 citation statements)
references
References 15 publications
0
55
0
1
Order By: Relevance
“…To find a non-linear differential path in RIPEMD-160, we use the techniques developed by Mendel et al [11,12]. This automated search algorithm can be used to find both, differential characteristics and conforming message pairs (note that we will use it only for the differential characteristics part in this article).…”
Section: Ripemd-160 Compression Functionmentioning
confidence: 99%
See 3 more Smart Citations
“…To find a non-linear differential path in RIPEMD-160, we use the techniques developed by Mendel et al [11,12]. This automated search algorithm can be used to find both, differential characteristics and conforming message pairs (note that we will use it only for the differential characteristics part in this article).…”
Section: Ripemd-160 Compression Functionmentioning
confidence: 99%
“…If an inconsistency occurs, the algorithm backtracks to an earlier state of the search and tries to correct it. Similar to [11,12], we denote these three parts of the search by decision (guessing), deduction (propagation), and backtracking (correction). Then, the search algorithm proceeds as follows: During the search, we mainly use generalized conditions [4] to store, restrict and propagate information (see Table 7 of Appendix B).…”
Section: Automated Search For Differential Characteristicsmentioning
confidence: 99%
See 2 more Smart Citations
“…Then Mendel et al improved the semi-free-start collisions on SHA-256 from 24 to 32 steps and gave a collision attack for 27 steps, which are all practical [19]. The best known collision attacks on SHA-256 so far are semi-free-start collisions for 38 and collisions for 31 out of 64 steps by Mendel et al in [20]. Recently, Eichlseder et al presented semi-free-start collisions for SHA-512 on up to 38 steps in [8].…”
Section: Introductionmentioning
confidence: 99%