Cryptanalysis of SHA-0 and Reduced SHA-1

5Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.

Abstract

We present new techniques for the cryptanalysis of hash functions. Our contributions are two-fold: both on the search level of the compression function and on the meta-structure. The former led to the neutral bits technique, while the latter led to the multi-block technique. The usefulness of these techniques is demonstrated on SHA-0 and SHA-1, but they are applicable to other hash functions as well. We use these techniques to find a collision of the full SHA-0 which is the first published collision of this function, and very efficient collision attacks on reduced versions of SHA-1.

Cite

CITATION STYLE

APA

Biham, E., Chen, R., & Joux, A. (2015). Cryptanalysis of SHA-0 and Reduced SHA-1. Journal of Cryptology, 28(1), 110–160. https://doi.org/10.1007/s00145-014-9179-8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free