2013
DOI: 10.1007/978-3-642-38348-9_15
|View full text |Cite
|
Sign up to set email alerts
|

New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis

Abstract: Abstract. The main contributions of this paper are two-fold. Firstly, we present a novel direction in the cryptanalysis of the cryptographic hash function SHA-1. Our work builds on previous cryptanalytic efforts on SHA-1 based on combinations of local collisions. Due to dependencies, previous approaches used heuristic corrections when combining the success probabilities and message conditions of the individual local collisions. Although this leads to success probabilities that are seemingly sufficient for feas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
70
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2
2

Relationship

2
8

Authors

Journals

citations
Cited by 61 publications
(72 citation statements)
references
References 11 publications
2
70
0
Order By: Relevance
“…Given the fact that no actual collisions are known yet, it is somewhat difficult to decide which triples to include. For this we refer to our recent analysis [Ste13] that seems to use the most appropriate cost function, namely one that is exact, exhaustive and takes the dependence of local collisions fully into account. However, due to the complex nature of constructing a collision attack, this cost function is not perfect as it does not accurately predict the final attack complexity.…”
Section: Application To Sha-1mentioning
confidence: 99%
“…Given the fact that no actual collisions are known yet, it is somewhat difficult to decide which triples to include. For this we refer to our recent analysis [Ste13] that seems to use the most appropriate cost function, namely one that is exact, exhaustive and takes the dependence of local collisions fully into account. However, due to the complex nature of constructing a collision attack, this cost function is not perfect as it does not accurately predict the final attack complexity.…”
Section: Application To Sha-1mentioning
confidence: 99%
“…In 2010 Marc Steven [8] presents an identical prefix collision attack on SHA-1 with complexities equivalent to approximately 2 61 (theoretical). SHA-512/224 and SHA-512/256 are also truncated version of SHA-512 but the initial values are generated using the method described in FIPS PUB 180-4 [3].…”
Section: Attacks On Sha-1mentioning
confidence: 99%
“…They introduce sufficient entropy so one can argue that the Markov chain assumption holds. However, exceptions from this rule with respect to differential analysis can be found in the case of ARX or ARX-like primitives -we refer the reader to [4,18,21,23,24] for such examples 1 .…”
Section: Introductionmentioning
confidence: 99%