Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and introduce the first results on SHA-1. The results include a generic multi-block technique that uses near-collisions in order to find collisions, and a four-block collision of SHA-0 found using this technique with complexity 251. Then, extension of this and prior techniques are presented, that allow us to find collisions of reduced versions of SHA-1. We give collisions of variants with up to 40 rounds, and show the complexities of longer variants. These techniques show that collisions up to about 53–58 rounds can still be found faster than by birthday attacks.
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
International audienceSHA-1 is a widely used 1995 NIST cryptographic hash function standard that was...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its intern...
Abstract. The main contributions of this paper are two-fold. Firstly, we present a novel direction i...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision ...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Abstract. We study the security of step-reduced but otherwise unmod-ified SHA-256. We show the first...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
International audienceSHA-1 is a widely used 1995 NIST cryptographic hash function standard that was...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its intern...
Abstract. The main contributions of this paper are two-fold. Firstly, we present a novel direction i...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision ...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Abstract. We study the security of step-reduced but otherwise unmod-ified SHA-256. We show the first...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
The concept of counter-cryptanalysis and a collision detection algorithm that detects whether a give...
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
International audienceSHA-1 is a widely used 1995 NIST cryptographic hash function standard that was...
We present in this article a freestart collision example for SHA-1, i.e., a collision for its intern...