Advertisement

A New Strategy for Finding a Differential Path of SHA-1

  • Jun Yajima
  • Yu Sasaki
  • Yusuke Naito
  • Terutoshi Iwasaki
  • Takeshi Shimoyama
  • Noboru Kunihiro
  • Kazuo Ohta
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4586)

Abstract

In this paper, we propose a new construction algorithm for finding differential paths of Round 1 of SHA-1 for use in the collision search attack. Generally, the differential path of Round 1 is very complex, and it takes much time to find one by hand. Therefore, we propose a new search algorithm that consists of three sub searches, naming the forward search, the backward search, and the joint search, so that we can find a differential path by computers. By implementing our new algorithm and doing some experiments on a computer, we actually found 383 differential paths in the joint search that are different from Wang’s. Since it is designed by quite a new policy, our algorithm can search a range of space that was not examined by existing algorithms.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    NIST. Secure hash standard. Federal Information Processing Standard, FIPS180-1 (April 1995)Google Scholar
  2. 2.
    Wang, X.: The Collision Attack on SHA-0 (in Chinese) (to appear), http://www.infosec.edu.cn
  3. 3.
    Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)Google Scholar
  4. 4.
    Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions in SHA-0 and Reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 36–57. Springer, Heidelberg (2005)Google Scholar
  5. 5.
    Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)Google Scholar
  6. 6.
    Wang, X., Yao, A.C, Yao, F.: Cryptanalysis on SHA-1 Hash Function. Keynote Speech at CRYPTOGRAPHIC HASH WORKSHOPGoogle Scholar
  7. 7.
    Wang, X.: Cryptanalysis of Hash functions and Potential Dangers. Invited Talk at CT-RSA (2006)Google Scholar
  8. 8.
    Hawkes, P., Paddon, M., Rose, G.: Automated Search for Round 1 Differentials for SHA-1: Work in Progress. NIST SECOND CRYPTOGRAPHIC HASH WORKSHOP (August 2006)Google Scholar
  9. 9.
    Cannière, C.D., Rechberger, C.: Finding SHA-1 Characteristics. ASIACRYPT (2006)Google Scholar
  10. 10.
    Cannière, C.D., Rechberger, C.: Finding SHA-1 Characteristics: General Results and Applications. NIST SECOND CRYPTOGRAPHIC HASH WORKSHOP (August 2006)Google Scholar
  11. 11.
    Wang, X.: Private Communication in JapanGoogle Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Jun Yajima
    • 1
  • Yu Sasaki
    • 2
  • Yusuke Naito
    • 2
  • Terutoshi Iwasaki
    • 3
  • Takeshi Shimoyama
    • 1
  • Noboru Kunihiro
    • 2
  • Kazuo Ohta
    • 2
  1. 1.FUJITSU LABORATORIES LTD. 4-1-1, Kamikodanaka, Nakahara-ku, Kawasaki, 211-8588Japan
  2. 2.The University of Electro-Communications 1-5-1, Chofugaoka, Chofu-shi, Tokyo, 182-8585Japan
  3. 3.Chuo University 1-13-27, Kasuga, Bunkyou-ku, Tokyo, 112-8551Japan

Personalised recommendations