Improved Collision Search for SHA-0

  • Yusuke Naito
  • Yu Sasaki
  • Takeshi Shimoyama
  • Jun Yajima
  • Noboru Kunihiro
  • Kazuo Ohta
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4284)

Abstract

At CRYPTO2005, Xiaoyun Wang, Hongbo Yu and Yiqun Lisa Yin proposed a collision attack on SHA-0 that could generate a collision with complexity 239 SHA-0 hash operations. Although the method of Wang et al. can find messages that satisfy the sufficient conditions in steps 1 to 20 by using message modification, it makes no mention of the message modifications needed to yield satisfaction of the sufficient conditions in steps 21 and onwards.

In this paper, first, we give sufficient conditions for the steps from step 21, and propose submarine modification as the message modification technique that will ensure satisfaction of the sufficient conditions from steps 21 to 24. Submarine modification is an extension of the multi-message modification used in collision attacks on the MD-family. Next, we point out that the sufficient conditions given by Wang et al. are not enough to generate a collision with high probability; we rectify this shortfall by introducing two new sufficient conditions. The combination of our newly found sufficient conditions and submarine modification allows us to generate a collision with complexity 236 SHA-0 hash operations. At the end of this paper, we show the example of a collision generated by applying our proposals.

Keywords

SHA-0 Collision Attack Message Modification Sufficient Condition 

References

  1. 1.
    Biham, E., Chen, R.: Near-Collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290–305. Springer, Heidelberg (2004)Google Scholar
  2. 2.
    Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and Reduced SHA-1. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 36–57. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56–71. Springer, Heidelberg (1998)Google Scholar
  4. 4.
    Joux, A.: Collision for SHA-0. In: Rump session of CRYPTO 2004 (August 2004)Google Scholar
  5. 5.
    NIST. Secure hash standard. Federal Information Processing Standard, FIPS-180 (May 1993)Google Scholar
  6. 6.
    NIST. Secure hash standard. Federal Information Processing Standard, FIPS-180-1 (April 1995)Google Scholar
  7. 7.
    Wang, X., Feng, D., Chen, H., Lai, X., Yu, X.: Collision for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. In: Rump Session of CRYPTO 2004 and Cryptology ePrint Archive, Report 2004/199 (2004)Google Scholar
  8. 8.
    Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1–18. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  10. 10.
    Wang, X.: The Collision Attack on SHA-0 (in Chinese) (to appear, 1997), www.infosec.edu.cn
  11. 11.
    Wang, X.: The Improved Collision Attack on SHA-0 (in Chinese) (to appear, 1998), www.infosec.edu.cn
  12. 12.
    Wang, X., Yao, A.C., Yao, F.: Cryptanalysis on SHA-1 Hash Function. In: Keynote Speech at CRYPTOGRAPHIC HASH WORKSHOPGoogle Scholar
  13. 13.
    Wang, X.: Cryptanalysis of Hash functions and Potential Dangers. In: CT-RSA (2006) (invited Talk)Google Scholar
  14. 14.
    Wang, X., Yu, H., Yin, Y.L.: Efficient Collision Search Attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 1–16. Springer, Heidelberg (2005)Google Scholar
  15. 15.
    Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yusuke Naito
    • 1
  • Yu Sasaki
    • 1
  • Takeshi Shimoyama
    • 2
  • Jun Yajima
    • 2
  • Noboru Kunihiro
    • 1
  • Kazuo Ohta
    • 1
  1. 1.The University of Electro-CommunicationsJapan
  2. 2.FUJITSU LABORATORIES LTD 

Personalised recommendations