Advertisement

Efficient Collision Search Attacks on SHA-0

  • Xiaoyun Wang
  • Hongbo Yu
  • Yiqun Lisa Yin
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3621)

Abstract

In this paper, we present new techniques for collision search in the hash function SHA-0. Using the new techniques, we can find collisions of the full 80-step SHA-0 with complexity less than 239 hash operations.

Keywords

Hash functions Collision search attacks SHA-0 SHA-1 

References

  1. 1.
    Biham, E., Chen, R.: Near Collisions of SHA-0. In: Advances in Cryptology – Crypto 2004, August 2004, pp. 290–305. Springer, Heidelberg (2004)Google Scholar
  2. 2.
    Biham, E., Chen, R.: New Results on SHA-0 and SHA-1. In: Crypto 2004 Rump Session (August 2004)Google Scholar
  3. 3.
    Biham, E., Chen, R., Joux, A., Carribault, P., Jalby, W., Lemuet, C.: Collisions in SHA-0 and Reduced SHA-1. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 36–57. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    NIST. Secure hash standard. Federal Information Processing Standard, FIPS-180 (May 1993)Google Scholar
  5. 5.
    NIST. Secure hash standard. Federal Information Processing Standard, FIPS-180-1 (April 1995)Google Scholar
  6. 6.
    Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Advances in Cryptology – Crypto 1998, August 1998, pp. 56–71. Springer, Heidelberg (1998)Google Scholar
  7. 7.
    Joux, A.: Collisions for SHA-0. In: Rump session of Crypto 2004 (August 2004)Google Scholar
  8. 8.
    Matusiewicz, K., Pieprzyk, J.: Finding Good Differential Patterns for Attacks on SHA-1. IACR Eprint archive (December 2004)Google Scholar
  9. 9.
    Rijmen, V., Osward, E.: Update on SHA-1. In: RSA Crypto Track 2005 (February 2005)Google Scholar
  10. 10.
    Wang, X.Y., Feng, D.G., Lai, X.J., Yu, H.B.: Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. In: Rump session of Crypto 2004 and IACR Eprint archive (August 2004)Google Scholar
  11. 11.
    Wang, X.Y., Feng, D.G., Yu, X.Y.: The Collision Attack on Hash Function HAVAL-128. Science in China, Series E 35(4), 405–416 (2005) (in Chinese)Google Scholar
  12. 12.
    Wang, X.Y., Yu, H.B.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  13. 13.
    Wang, X.Y., Lai, X.J., Feng, D.G., Chen, H., Yu, X.Y.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1–18. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  14. 14.
    Wang, X.Y.: The Collision attack on SHA-0 (1997) (in Chinese) (to appear), http://www.infosec.edu.cn
  15. 15.
    Wang, X.Y.: The Improved Collision attack on SHA-0 (1998), http://www.infosec.edu.cn (in Chinese) (to appear)
  16. 16.
    Wang, X.Y., Yin, Y.L., Yu, H.B.: Finding Collisions in the Full SHA-1. In: These proceedings,Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Xiaoyun Wang
    • 1
  • Hongbo Yu
    • 1
  • Yiqun Lisa Yin
    • 2
  1. 1.Shandong UniversityChina
  2. 2.Independent Security ConsultantGreenwichUS

Personalised recommendations