Finding SHA-1 characteristics: General results and applications

163Citations
Citations of this article
61Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is particularly useful for multi-block attacks, and as a proof of concept, we give a two-block collision for 64-step SHA-1 based on a new characteristic. The highest number of steps for which a SHA-1 collision was published so far was 58. We also give a unified view on the expected work factor of a collision search and the needed degrees of freedom for the search, which facilitates optimization. © 2006 Springer-Verlag.

Cite

CITATION STYLE

APA

De Cannière, C., & Rechberger, C. (2006). Finding SHA-1 characteristics: General results and applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4284 LNCS, pp. 1–20). https://doi.org/10.1007/11935230_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free