首页> 外文会议>Cryptographers' Track at the RSA Conference >On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study
【24h】

On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study

机译:关于ASIC硬件饼干的成本:SHA-1案例研究

获取原文

摘要

In February 2017, the SHA-1 hashing algorithm was practically broken using an identical-prefix collision attack implemented on a GPU cluster, and in January 2020 a chosen-prefix collision was first computed with practical implications on various security protocols. These advances opened the door for several research questions, such as the minimal cost to perform these attacks in practice. In particular, one may wonder what is the best technology for software/hardware cryptanalysis of such primitives. In this paper, we address some of these questions by studying the challenges and costs of building an ASIC cluster for performing attacks against a hash function. Our study takes into account different scenarios and includes two cryptanalytic strategies that can be used to find such collisions: a classical generic birthday search, and a state-of-the-art differential attack using neutral bits for SHA-1. We show that for generic attacks, GPU and ASIC poses a serious practical threat to primitives with security level ~ 64 bits, with rented GPU a good solution for a one-off attack, and ASICs more efficient if the attack has to be run a few times. ASICs also pose a non-negligible security risk for primitives with 80-bit security. For differential attacks, GPUs (purchased or rented) are often a very cost-effective choice, but ASIC provides an alternative for organizations that can afford the initial cost and look for a compact, energy-efficient, reusable solution. In the case of SHA-1, we show that an ASIC cluster costing a few millions would be able to generate chosen-prefix collisions in a day or even in a minute. This extends the attack surface to TLS and SSH, for which the chosen-prefix collision would need to be generated very quickly.
机译:2017年2月,SHA-1散列算法实际上使用GPU集群实现的相同前缀冲突攻击,并且在1月20日期间,首先在各种安全协议上使用实际意义计算选择的前缀碰撞。这些进展为几个研究问题开辟了门,例如在实践中执行这些攻击的最小成本。特别是,人们可能怀疑这种基元的软件/硬件密码分析是什么。在本文中,我们通过研究构建ASIC集群的挑战和成本来解决这些问题,以便对哈希函数进行攻击。我们的研究考虑了不同的场景,包括两个可以用于找到此类冲突的密码策略:经典通用生日搜索,以及使用SHA-1的中性位的最先进的差异攻击。我们表明,对于通用攻击,GPU和ASIC对带有安全级别〜64位的基元构成了严重的实际威胁,通过租用GPU一个良好的解决方案,即一次性解决方案,如果攻击必须运行一些攻击,则效率更高。时代。 Asics还对具有80位安全性的基元构成了不可忽略的安全风险。对于差异攻击,GPU(购买或租用)通常是一个非常具有成本效益的选择,但ASIC为可以提供初始成本并寻找紧凑,节能,可重复使用的解决方案的组织提供替代方案。在SHA-1的情况下,我们表明耗资量几百万年的ASIC集群将能够在一天中或即使在一分钟内生成所选的前缀碰撞。这将攻击表面扩展到TLS和SSH,所以需要非常快速地生成所选择的前缀冲突。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号