首页> 外文会议>Selected Areas in Cryptography >Security Analysis of SHA-256 and Sisters
【24h】

Security Analysis of SHA-256 and Sisters

机译:SHA-256和姐妹的安全性分析

获取原文

摘要

This paper studies the security of SHA-256, SHA-384 and SHA-512 against collision attacks and provides some insight into the security properties of the basic building blocks of the structure. It is concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks apply. Differential and linear attacks also don't apply on the underlying structure. However we show that slightly simplified versions of the hash functions are surprisingly weak : whenever symmetric constants and initialization values are used throughout the computations, and modular additions are replaced by exclusive or operations, symmetric messages hash to symmetric digests. Therefore the complexity of collision search on these modified hash functions potentially becomes as low as one wishes.
机译:本文研究了SHA-256,SHA-384和SHA-512抵御冲突攻击的安全性,并提供了对该结构基本构建块的安全性属性的一些了解。得出的结论是,沙波德和乔克斯的攻击都没有适用,而杜宾汀式的攻击都没有适用。差分攻击和线性攻击也不适用于基础结构。但是,我们显示出哈希函数的略微简化版本出奇地薄弱:只要在整个计算过程中使用对称常量和初始化值,并且用互斥或运算代替模块化加法,对称消息就会散列到对称摘要中。因此,在这些修改后的散列函数上进行冲突搜索的复杂性可能会降低到人们希望的水平。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号