【24h】

Security Analysis of SHA-256 and Sisters

机译:SHA-256和SISTERS的安全分析

获取原文

摘要

This paper studies the security of SHA-256, SHA-384 and SHA-512 against collision attacks and provides some insight into the security properties of the basic building blocks of the structure. It is concluded that neither Chabaud and Jouxs attack, nor Dobbertin-style attacks apply. Differential and linear attacks also dont apply on the underlying structure. However we show that slightly simplified versions of the hash functions are surprisingly weak : whenever symmetric constants and initialization values are used throughout the computations, and modular additions are replaced by exclusive or operations, symmetric messages hash to symmetric digests. Therefore the complexity of collision search on these modified hash functions potentially becomes as low as one wishes.
机译:本文研究了SHA-256,SHA-384和SHA-512对碰撞攻击的安全性,并对结构的基本构建块的安全性质进行了一些了解。结论是Chabaud和Jouxs攻击,也不适用Dobbertin风格的攻击。差分和线性攻击也不适用于底层结构。但是,我们显示散列函数的略微简化版本令人惊讶弱:每当在整个计算中使用对称常数和初始化值,并且通过独占或操作替换模块化添加,对称摘要对称消息散列。因此,在这些修改的散列函数上的碰撞搜索的复杂性可能变得低于一个愿望。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号