2011
DOI: 10.1007/978-3-642-25385-0_15
|View full text |Cite
|
Sign up to set email alerts
|

Second-Order Differential Collisions for Reduced SHA-256

Abstract: Abstract. In this work, we introduce a new non-random property for hash/compression functions using the theory of higher order differentials. Based on this, we show a second-order differential collision for the compression function of SHA-256 reduced to 47 out of 64 steps with practical complexity. We have implemented the attack and provide an example. Our results suggest that the security margin of SHA-256 is much lower than the security margin of most of the SHA-3 finalists in this setting. The techniques em… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
55
1
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 45 publications
(57 citation statements)
references
References 35 publications
0
55
1
1
Order By: Relevance
“…About the boomerang attack on hash functions, we mainly review the known-related-key boomerang method given in [19]. We consider the compression function, denoted by CF , as CF (M, K) = E(M, K) + M and that it can be decomposed into two sub-functions as CF = CF 1 • CF 0 .…”
Section: The Boomerang Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…About the boomerang attack on hash functions, we mainly review the known-related-key boomerang method given in [19]. We consider the compression function, denoted by CF , as CF (M, K) = E(M, K) + M and that it can be decomposed into two sub-functions as CF = CF 1 • CF 0 .…”
Section: The Boomerang Attackmentioning
confidence: 99%
“…We consider the compression function, denoted by CF , as CF (M, K) = E(M, K) + M and that it can be decomposed into two sub-functions as CF = CF 1 • CF 0 . In this way, we can start from the middle steps since M and the key K can be chosen randomly [19,23]. Then we have a backward (top) differential characteristic (β, β k ) → α with probability p for CF −1 0 , and a forward (bottom) differential characteristic (γ, γ k ) → δ with probability q for CF 1 .…”
Section: The Boomerang Attackmentioning
confidence: 99%
“…In the known-key setting, a (related-key) boomerang attack can be used to distinguish a given permutation from a random oracle; it is called known-related-key boomerang attack in [5]. Applying the known-related-key boomerang attack to the compression function in the MMO mode, i.e, CF (K, M ) = E K (M ) + M , it is possible to start from the middle rounds because the message M and the key K can be selected randomly (refer to [5] and [14]).…”
Section: The Boomerang Attackmentioning
confidence: 99%
“…Applying the known-related-key boomerang attack to the compression function in the MMO mode, i.e, CF (K, M ) = E K (M ) + M , it is possible to start from the middle rounds because the message M and the key K can be selected randomly (refer to [5] and [14]). The (known-relatedkey) boomerang attack is particularly efficient for the ARX-type hash functions because their compression functions have strong diffusion after several steps, only short differential paths with high probabilities can be found.…”
Section: The Boomerang Attackmentioning
confidence: 99%
See 1 more Smart Citation