Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and show how to turn them into collisions. We present a collision attack on 28 steps of the hash function with practical complexity. Using a two-block approach we are able to turn a semi-free-start collision into a collision for 31 steps with a complexity of at most 265.5. The main improvement of our work is to extend the size of the local collisions used in these attacks. To construct differential character-istics and confirming message pairs for longer local collisions, we had to improve the search strategy of our automated search tool. To test the limits of our techniques we present a semi-free-start collision for 38 steps
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this work, we present practical semi-free-start collisions for SHA-512 on up to 38 (out...
We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision ...
Abstract. We study the security of step-reduced but otherwise unmod-ified SHA-256. We show the first...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
Abstract. In this paper we analyze the security of the compression function of SHA-1 against collisi...
Abstract. The starting point for collision attacks on practical hash functions is a local collision....
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
In this paper we analyze the security of the compression function of SHA-1 against collision attack...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
The main contributions of this paper are two-fold. Firstly, we present a novel direction in the ...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this paper, we present new collision search attacks on the hash function SHA-1. We show...
Abstract. In this work, we present practical semi-free-start collisions for SHA-512 on up to 38 (out...
We study the security of step-reduced but otherwise unmodified SHA-256. We show the first collision ...
Abstract. We study the security of step-reduced but otherwise unmod-ified SHA-256. We show the first...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
Abstract. In this paper we analyze the security of the compression function of SHA-1 against collisi...
Abstract. The starting point for collision attacks on practical hash functions is a local collision....
Abstract. In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and in...
In this paper we analyze the security of the compression function of SHA-1 against collision attack...
This is the first article analyzing the security of SHA-256 against fast collision search which cons...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
SHA-1 is a widely used cryptographic hashing algorithm for validating the integrity of data. Until r...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...