Bicliques for preimages: Attacks on Skein-512 and the SHA-2 family

95Citations
Citations of this article
80Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a new concept of biclique as a tool for preimage attacks, which employs many powerful techniques from differential cryptanalysis of block ciphers and hash functions. The new tool has proved to be widely applicable by inspiring many authors to publish new results of the full versions of AES, KASUMI, IDEA, and Square. In this paper, we show how our concept leads to the first cryptanalysis of the round-reduced Skein hash function, and describe an attack on the SHA-2 hash function with more rounds than before. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Khovratovich, D., Rechberger, C., & Savelieva, A. (2012). Bicliques for preimages: Attacks on Skein-512 and the SHA-2 family. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7549 LNCS, pp. 244–263). https://doi.org/10.1007/978-3-642-34047-5_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free