...
【24h】

Constructing New Differential Paths and Algebraic Cryptanalysis for Full-SHA-1

机译:Full-SHA-1的新微分路径的构建和代数密码分析

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Since the cryptanalysis for SHA-1 was proposed [19], many improvements have been proposed. Recently a new result was proposed which claims that it can compute collisions in 2~(52) SHA-1 computation, though it includes some problems [10]. Based on their attack, we had reconstructed their method algebraically using Grobner basis based formulation. In this formulation, we propose a new method to construct differentials and sufficient conditions automatically from disturbance vector and also propose some more new techniques: round-wise semi-neutral bits, global boomerang and adaptive amplified boomerang techniques. Using these new methods, we obtained sufficient conditions of full SHA-1 based on the new disturbance vector offered in [10] and succeeded in implementation.
机译:自从提出了SHA-1的密码分析方法[19]以来,已经提出了许多改进。最近,有人提出了一个新的结果,声称它可以在2〜(52)SHA-1计算中计算碰撞,尽管它存在一些问题[10]。基于他们的攻击,我们使用基于Grobner基的公式代数地重构了他们的方法。在此公式中,我们提出了一种从干扰向量自动构造微分和充分条件的新方法,并提出了更多新技术:圆形半中性位,全局回旋镖和自适应放大回旋镖技术。使用这些新方法,我们基于[10]中提供的新干扰向量获得了充分的SHA-1条件,并成功实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号