Finding SHA-2 characteristics: Searching through a minefield of contradictions

55Citations
Citations of this article
47Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we analyze the collision resistance of SHA-2 and provide the first results since the beginning of the NIST SHA-3 competition. We extend the previously best known semi-free-start collisions on SHA-256 from 24 to 32 (out of 64) steps and show a collision attack for 27 steps. All our attacks are practical and verified by colliding message pairs. We present the first automated tool for finding complex differential characteristics in SHA-2 and show that the techniques on SHA-1 cannot directly be applied to SHA-2. Due to the more complex structure of SHA-2 several new problems arise. Most importantly, a large amount of contradicting conditions occur which render most differential characteristics impossible. We show how to overcome these difficulties by including the search for conforming message pairs in the search for differential characteristics. © 2011 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Mendel, F., Nad, T., & Schläffer, M. (2011). Finding SHA-2 characteristics: Searching through a minefield of contradictions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7073 LNCS, pp. 288–307). https://doi.org/10.1007/978-3-642-25385-0_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free