Finding SHA-1 Characteristics: General Results and Applications
- Christophe De Cannière,
- Christian Rechberger
- … show all 2 hide
Abstract
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is particularly useful for multi-block attacks, and as a proof of concept, we give a two-block collision for 64-step SHA-1 based on a new characteristic. The highest number of steps for which a SHA-1 collision was published so far was 58. We also give a unified view on the expected work factor of a collision search and the needed degrees of freedom for the search, which facilitates optimization.
- Biham, E., Chen, R. Near-Collisions of SHA-0. In: Franklin, M. eds. (2004) Advances in Cryptology – CRYPTO 2004. Springer, Heidelberg, pp. 290-305
- Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W. Collisions of SHA-0 and Reduced SHA-1. In: Cramer, R.J.F. eds. (2005) Advances in Cryptology – EUROCRYPT 2005. Springer, Heidelberg, pp. 36-57 CrossRef
- Black, J.A., Cochran, M., Highland, T. A Study of the MD5 Attacks: Insights and Improvements. In: Robshaw, M.J.B. eds. (2006) Fast Software Encryption. Springer, Heidelberg, pp. 262-277 CrossRef
- Chabaud, F., Joux, A. Differential Collisions in SHA-0. In: Krawczyk, H. eds. (1998) Advances in Cryptology - CRYPTO ’98. Springer, Heidelberg, pp. 56-71
- Jutla, C.S., Patthak, A.C. Provably Good Codes for Hash Function Design. In: Biham, E., Youssef, A.M. eds. (2007) Selected Areas in Cryptography. Springer, Heidelberg, pp. 376-393 CrossRef
- Kelsey, J., Kohno, T. Herding Hash Functions and the Nostradamus Attack. In: Vaudenay, S. eds. (2006) Advances in Cryptology - EUROCRYPT 2006. Springer, Heidelberg, pp. 183-200 CrossRef
- Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105 (2006), http://eprint.iacr.org/
- Liang, J., Lai, X.: Improved Collision Attack on Hash Function MD5. Cryptology ePrint Archive, Report 2005/425 (2005), http://eprint.iacr.org/
- Naito, Y., Sasaki, Y., Kunihiro, N., Ohta, K.: Improved Collision Attack on MD4. Cryptology ePrint Archive, Report 2005/151 (2005), http://eprint.iacr.org/
- Naito, Y., Sasaki, Y., Shimoyama, T., Yajima, J., Kunihiro, N., Ohta, K.: Message Modification for Step 21-23 on SHA-0. Cryptology ePrint Archive, Report 2006/016 (2006), http://eprint.iacr.org/
- National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard (August 2002), Available online at: http://www.itl.nist.gov/fipspubs/
- Pramstaller, N., Rechberger, C., Rijmen, V. Exploiting Coding Theory for Collision Attacks on SHA-1. In: Smart, N.P. eds. (2005) Cryptography and Coding. Springer, Heidelberg, pp. 78-95 CrossRef
- Rijmen, V., Oswald, E. Update on SHA-1. In: Menezes, A. eds. (2005) Topics in Cryptology – CT-RSA 2005. Springer, Heidelberg, pp. 58-71 CrossRef
- Schläffer, M., Oswald, E. Searching for Differential Paths in MD4. In: Robshaw, M.J.B. eds. (2006) Fast Software Encryption. Springer, Heidelberg, pp. 242-261 CrossRef
- Stevens, M.: Fast Collision Attack on MD5. Cryptology ePrint Archive, Report 2006/104 (2006), http://eprint.iacr.org/
- Sugita, M., Kawazoe, M., Imai, H.: Gröbner Basis Based Cryptanalysis of SHA-1. Cryptology ePrint Archive, Report 2006/098 (2006), http://eprint.iacr.org/
- Wang, X., Lai, X., Feng, D., Chen, H., Yu, X. Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R.J.F. eds. (2005) Advances in Cryptology – EUROCRYPT 2005. Springer, Heidelberg, pp. 1-18 CrossRef
- Wang, X., Yao, A., Yao, F.: Cryptanalysis of SHA-1. In: The Cryptographic Hash Workshop hosted by NIST (October 2005)
- Wang, X., Yao, A., Yao, F.: New Collision Search for SHA-1. In: Rump session of CRYPTO (August 2005)
- Wang, X., Yin, Y.L., Yu, H. Finding Collisions in the Full SHA-1. In: Shoup, V. eds. (2005) Advances in Cryptology – CRYPTO 2005. Springer, Heidelberg, pp. 17-36
- Wang, X., Yu, H. How to Break MD5 and Other Hash Functions. In: Cramer, R. eds. (2005) Advances in Cryptology – EUROCRYPT 2005. Springer, Heidelberg, pp. 19-35 CrossRef
- Wang, X., Yu, H., Yin, Y.L. Efficient Collision Search Attacks on SHA-0. In: Shoup, V. eds. (2005) Advances in Cryptology – CRYPTO 2005. Springer, Heidelberg, pp. 1-16
- Yin, Y.L.: Personal Communication (March 2006)
- Title
- Finding SHA-1 Characteristics: General Results and Applications
- Book Title
- Advances in Cryptology – ASIACRYPT 2006
- Book Subtitle
- 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006. Proceedings
- Pages
- pp 1-20
- Copyright
- 2006
- DOI
- 10.1007/11935230_1
- Print ISBN
- 978-3-540-49475-1
- Online ISBN
- 978-3-540-49476-8
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 4284
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Industry Sectors
- eBook Packages
- Editors
-
-
Xuejia Lai
(16)
-
Kefei Chen
(16)
-
Xuejia Lai
- Editor Affiliations
-
- 16. Department of Computer Science and Engineering, Shanghai Jiao Tong University
- Authors
-
-
Christophe De Cannière
(17)
(18)
-
Christian Rechberger
(17)
-
Christophe De Cannière
- Author Affiliations
-
- 17. Institute for Applied Information Processing and Communications, Graz University of Technology, Inffeldgasse 16a, A–8010, Graz, Austria
- 18. Dept. ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B–3001, Heverlee, Belgium
Continue reading...
To view the rest of this content please follow the download PDF link above.