Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks

18Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In 2007, the U.S. National Institute of Standards and Technology (NIST) announced a public contest aiming at the selection of a new standard for a cryptographic hash function. In this paper, the security margin of five SHA-3 finalists is evaluated with an assumption that attacks launched on finalists should be practically verified. A method of attacks is called logical cryptanalysis where the original task is expressed as a SATisfiability problem. To simplify the most arduous stages of this type of cryptanalysis and helps to mount the attacks in a uniform way a new toolkit is used. In the context of SAT-based attacks, it has been shown that all the finalists have substantially bigger security margin than the current standards SHA-256 and SHA-1. © 2012 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Homsirikamol, E., Morawiecki, P., Rogawski, M., & Srebrny, M. (2012). Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7564 LNCS, pp. 56–67). Springer Verlag. https://doi.org/10.1007/978-3-642-33260-9_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free