2021
DOI: 10.1007/978-3-030-75539-3_27
|View full text |Cite
|
Sign up to set email alerts
|

On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study

Abstract: In February 2017, the SHA-1 hashing algorithm was practically broken using an identical-prefix collision attack implemented on a GPU cluster, and in January 2020 a chosen-prefix collision was first computed with practical implications on various security protocols. These advances opened the door for several research questions, such as the minimal cost to perform these attacks in practice. In particular, one may wonder what is the best technology for software/hardware cryptanalysis of such primitives. In this p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…NIST has standardized three well-known hash functions: SHA-1, SHA-2, and SHA-3. However, SHA-1 is no longer secure due to known attacks [60]. Aside from those hash functions, some hash functions for constrained environments have been developed, such as Quark [61], SPONGNET [62] and PHOTON [63].…”
Section: Hash Functionmentioning
confidence: 99%
See 1 more Smart Citation
“…NIST has standardized three well-known hash functions: SHA-1, SHA-2, and SHA-3. However, SHA-1 is no longer secure due to known attacks [60]. Aside from those hash functions, some hash functions for constrained environments have been developed, such as Quark [61], SPONGNET [62] and PHOTON [63].…”
Section: Hash Functionmentioning
confidence: 99%
“…Consider the case when H ID = H PW = 32. The insider adversary is thus required to execute 2 × 2 32 calculations to extract PW X , which can be conducted in seconds on a typical personal computer, but a naive adversary is anticipated to do 2 × 2 64 computations, which is presently not doable even for a mediumsized corporation [60]. As a result, SPP is vulnerable to a privileged opponent who has access to the protocol's registration step.…”
Section: Insider Adversarymentioning
confidence: 99%