2004
DOI: 10.1007/978-3-540-24654-1_13
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of SHA-256 and Sisters

Abstract: Abstract. This paper studies the security of SHA-256, SHA-384 and SHA-512 against collision attacks and provides some insight into the security properties of the basic building blocks of the structure. It is concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks apply. Differential and linear attacks also don't apply on the underlying structure. However we show that slightly simplified versions of the hash functions are surprisingly weak : whenever symmetric constants and initialization … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
119
0
1

Year Published

2006
2006
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 203 publications
(120 citation statements)
references
References 18 publications
0
119
0
1
Order By: Relevance
“…Being standardized by NIST in 2000 [13], the first published independent analysis of members of the SHA-2 family was done by Gilbert and Handschuh [6]. They show that there exists a 9-step local collision with probability 2 −66 .…”
Section: Survey Of Existing Results On Sha-256mentioning
confidence: 99%
See 3 more Smart Citations
“…Being standardized by NIST in 2000 [13], the first published independent analysis of members of the SHA-2 family was done by Gilbert and Handschuh [6]. They show that there exists a 9-step local collision with probability 2 −66 .…”
Section: Survey Of Existing Results On Sha-256mentioning
confidence: 99%
“…In the case of the Boolean functions f IF and f M AJ , several approximations are possible which all hold with probability 0.5. Superficially comparing the results in [7] and [6] 1 would lead to the preliminary conclusion that the notion of modular differences instead of XOR differences offers a significant advantage. However, we argue that this is not the case.…”
Section: Description Of Sha-256mentioning
confidence: 99%
See 2 more Smart Citations
“…Known Results for the SHA-2 Family: Gilbert and Handschuh (GH) [2] were the first to study local collisions in the SHA-2 family. They reported a 9-step local collision for linearized version of SHA-256 and estimated the probability of the differential path to be 2 −66 .…”
Section: Introductionmentioning
confidence: 99%