2009
DOI: 10.1007/978-3-642-10366-7_34
|View full text |Cite
|
Sign up to set email alerts
|

Preimages for Step-Reduced SHA-2

Abstract: Abstract. In this paper, we present preimage attacks on up to 43-step SHA-256 (around 67% of the total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly increases the number of attacked steps compared to the best previously published preimage attack working for 24 steps. The time complexities are 2 251.9 , 2 509 for finding pseudo-preimages and 2 254.9 , 2 511.5 compression function operations for full preimages. The memory requirements are modest, around 2 6 words for 43-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
122
0
2

Year Published

2012
2012
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 80 publications
(125 citation statements)
references
References 18 publications
1
122
0
2
Order By: Relevance
“…Next, if these are the only such vectors that occur in practice, then we have recovered z 1(30) , or the MSB of k 0 , with probability 1 when the time taken to execute (2) is at its minimum. This minimum time period would naturally be T const + T carry , with T const being the constant time component (i.e., the sum total of the execution times of the steps, of the Add()'s invoked for (2), that are independent of the respective x's and y's). With this, let us proceed to the second step of the initialization mode, viz.,…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Next, if these are the only such vectors that occur in practice, then we have recovered z 1(30) , or the MSB of k 0 , with probability 1 when the time taken to execute (2) is at its minimum. This minimum time period would naturally be T const + T carry , with T const being the constant time component (i.e., the sum total of the execution times of the steps, of the Add()'s invoked for (2), that are independent of the respective x's and y's). With this, let us proceed to the second step of the initialization mode, viz.,…”
Section: Methodsmentioning
confidence: 99%
“…The problem with the cache memory is that, unlike the RAM, it is shared among users sharing a CPU. 2 Hence, if Bob and Eve are sharing a CPU and Eve is aware that Bob is about to encrypt, Eve may initiate her cache timing attack as follows. She first fills the cache memory with values of her choice and waits for Bob to run the encryption algorithm.…”
Section: Timelinementioning
confidence: 99%
“…A straightforward attack on 6 rounds uses a biclique in rounds 2-4 of Skein and word S 1 of the output of the 6-round transformation as the matching variable v (Figure 4). However, we extend it by one round with the idea of the indirect partial matching [1]. Consider the state word S 0 after round 6 as a function of P i,j .…”
Section: Skein-512mentioning
confidence: 99%
“…The message compensation procedure [1,16] instructs how to select message groups in the splice-and-cut attack in case of a strong, nonlinear message schedule. Existing applications are very ad-hoc and complicated.…”
Section: Message Compensationmentioning
confidence: 99%
See 1 more Smart Citation