A new hash family obtained by modifying the SHA-2 family
Somitra Kumar Sanadhya,Palash Sarkar +1 more
- pp 353-363
Reads0
Chats0
TLDR
The general idea of "multiple feed-forward" for the construction of cryptographic hash functions is introduced, which can provide increased resistance to the Chabaud-Joux type "perturbation-correction" collision attacks.Abstract:
In this work, we study several properties of the SHA-2 design which have been utilized in recent collision attacks against reduced round SHA-2. Small modifications to the SHA-2 design are suggested to thwart these attacks. The modified round function provides the same resistance to linearization attacks as the original SHA-2 round function, but, provides better resistance to non-linear attacks. Our next contribution is to introduce the general idea of "multiple feed-forward" for the construction of cryptographic hash functions. This can provide increased resistance to the Chabaud-Joux type "perturbation-correction" collision attacks. The idea of feed-forward is taken further by introducing the idea of feed-forward across message blocks leading to resistance against generic multi-collision attacks. The net effect of the suggested changes to the SHA-2 design has insignificant impact on the efficiency of computing the digest.read more
Citations
More filters
Book
Information Security and Cryptology - ICISC 2007 : 10th International Conference Seoul, Korea, November 29-30, 2007 : proceedings
Kil-Hyun Nam,Gwangsoo Rhee +1 more
TL;DR: A Secure Virtual Execution Environment for Untrusted Code and Security-Preserving Asymmetric Protocol Encapsulation are studied.
Journal ArticleDOI
A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks
Aamir Shahzad,Malrey Lee,Neal N. Xiong,Gisung Jeong,Young Keun Lee,Jae-Young Choi,Abdul Waheed Mahesar,Iftikhar Ahmad +7 more
TL;DR: To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.
Combining private and public key encryption techniques for providing extreme secure environment for an academic institution application
TL;DR: This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively, and is self sufficient in terms of the data that it stores.
Message encryption and decryption on mobile phones
Kabir Murtala,Abidemi Adeniyi +1 more
TL;DR: This paper presents an Encryption/Decryption application of messages on both java and Android phones and the method of encryption of message is AES (Advance Encryption System) where the same key that was used to encrypt is used to decrypt.
Journal ArticleDOI
A combinatorial analysis of recent attacks on step reduced SHA-2 family
TL;DR: This analysis explains in a unified way the recent attacks against reduced round SHA-2 in a general class of local collisions and shows that the previously used local collision by Nikolić and Biryukov and Sanadhya and Sarkar are special cases.
References
More filters
Posted Content
New Collision attacks Against Up To 24-step SHA-2.
TL;DR: New and improved attacks against 22, 23 and 24-step SHA-2 family using a local collision given by Sanadhya and Sarkar (SS) at ACISP '08 are provided.
Book ChapterDOI
Collisions for Step-Reduced SHA-256
Ivica Nikolic,Alex Biryukov +1 more
TL;DR: A differential that holds with high probability if the message satisfies certain conditions is developed, which helps to find collisions for step-reduced SHA-256.
Posted Content
On Corrective Patterns for the SHA-2 Family.
TL;DR: In this article, it was shown that the complexity of obtaining a collision is 2 when the register state is unknown, and a factor of 2 corresponds to 30 bits of internal state that must be guessed correctly in order to generate a collision.
Book
Information Security and Cryptology - ICISC 2007 : 10th International Conference Seoul, Korea, November 29-30, 2007 : proceedings
Kil-Hyun Nam,Gwangsoo Rhee +1 more
TL;DR: A Secure Virtual Execution Environment for Untrusted Code and Security-Preserving Asymmetric Protocol Encapsulation are studied.