scispace - formally typeset
Open AccessProceedings ArticleDOI

A new hash family obtained by modifying the SHA-2 family

Reads0
Chats0
TLDR
The general idea of "multiple feed-forward" for the construction of cryptographic hash functions is introduced, which can provide increased resistance to the Chabaud-Joux type "perturbation-correction" collision attacks.
Abstract
In this work, we study several properties of the SHA-2 design which have been utilized in recent collision attacks against reduced round SHA-2. Small modifications to the SHA-2 design are suggested to thwart these attacks. The modified round function provides the same resistance to linearization attacks as the original SHA-2 round function, but, provides better resistance to non-linear attacks. Our next contribution is to introduce the general idea of "multiple feed-forward" for the construction of cryptographic hash functions. This can provide increased resistance to the Chabaud-Joux type "perturbation-correction" collision attacks. The idea of feed-forward is taken further by introducing the idea of feed-forward across message blocks leading to resistance against generic multi-collision attacks. The net effect of the suggested changes to the SHA-2 design has insignificant impact on the efficiency of computing the digest.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Information Security and Cryptology - ICISC 2007 : 10th International Conference Seoul, Korea, November 29-30, 2007 : proceedings

TL;DR: A Secure Virtual Execution Environment for Untrusted Code and Security-Preserving Asymmetric Protocol Encapsulation are studied.
Journal ArticleDOI

A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

TL;DR: To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

Combining private and public key encryption techniques for providing extreme secure environment for an academic institution application

TL;DR: This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively, and is self sufficient in terms of the data that it stores.

Message encryption and decryption on mobile phones

TL;DR: This paper presents an Encryption/Decryption application of messages on both java and Android phones and the method of encryption of message is AES (Advance Encryption System) where the same key that was used to encrypt is used to decrypt.
Journal ArticleDOI

A combinatorial analysis of recent attacks on step reduced SHA-2 family

TL;DR: This analysis explains in a unified way the recent attacks against reduced round SHA-2 in a general class of local collisions and shows that the previously used local collision by Nikolić and Biryukov and Sanadhya and Sarkar are special cases.
References
More filters
Posted Content

New Collision attacks Against Up To 24-step SHA-2.

TL;DR: New and improved attacks against 22, 23 and 24-step SHA-2 family using a local collision given by Sanadhya and Sarkar (SS) at ACISP '08 are provided.
Book ChapterDOI

Collisions for Step-Reduced SHA-256

TL;DR: A differential that holds with high probability if the message satisfies certain conditions is developed, which helps to find collisions for step-reduced SHA-256.
Posted Content

On Corrective Patterns for the SHA-2 Family.

TL;DR: In this article, it was shown that the complexity of obtaining a collision is 2 when the register state is unknown, and a factor of 2 corresponds to 30 bits of internal state that must be guessed correctly in order to generate a collision.
Book

Information Security and Cryptology - ICISC 2007 : 10th International Conference Seoul, Korea, November 29-30, 2007 : proceedings

TL;DR: A Secure Virtual Execution Environment for Untrusted Code and Security-Preserving Asymmetric Protocol Encapsulation are studied.
Related Papers (5)