Abstract. In this work, we present practical semi-free-start collisions for SHA-512 on up to 38 (out of 80) steps with complexity 240.5. The best previously published result was on 24 steps. The attack is based on extending local collisions as proposed by Mendel et al. in their Eurocrypt 2013 attack on SHA-256. However, for SHA-512, the search space is too large for direct application of these techniques. We achieve our result by improving the branching heuristic of the guess-and-determine approach to find differential characteristics and conforming message pairs. Exper-iments show that for smaller problems like 27 steps of SHA-512, the heuristic can also speed up the collision search by a factor of 220
Abstract. The starting point for collision attacks on practical hash functions is a local collision....
We present a brief report on the collision search for the reduced SHA-1. With a few improvements to ...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
Recent progress in hash functions analysis has led to collisions on reduced versions of SHA-256. As ...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream ci...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
Abstract. The starting point for collision attacks on practical hash functions is a local collision....
We present a brief report on the collision search for the reduced SHA-1. With a few improvements to ...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
Recent progress in hash functions analysis has led to collisions on reduced versions of SHA-256. As ...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream ci...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
Abstract. The starting point for collision attacks on practical hash functions is a local collision....
We present a brief report on the collision search for the reduced SHA-1. With a few improvements to ...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...