scispace - formally typeset
Open AccessProceedings ArticleDOI

A new hash family obtained by modifying the SHA-2 family

Reads0
Chats0
TLDR
The general idea of "multiple feed-forward" for the construction of cryptographic hash functions is introduced, which can provide increased resistance to the Chabaud-Joux type "perturbation-correction" collision attacks.
Abstract
In this work, we study several properties of the SHA-2 design which have been utilized in recent collision attacks against reduced round SHA-2. Small modifications to the SHA-2 design are suggested to thwart these attacks. The modified round function provides the same resistance to linearization attacks as the original SHA-2 round function, but, provides better resistance to non-linear attacks. Our next contribution is to introduce the general idea of "multiple feed-forward" for the construction of cryptographic hash functions. This can provide increased resistance to the Chabaud-Joux type "perturbation-correction" collision attacks. The idea of feed-forward is taken further by introducing the idea of feed-forward across message blocks leading to resistance against generic multi-collision attacks. The net effect of the suggested changes to the SHA-2 design has insignificant impact on the efficiency of computing the digest.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Information Security and Cryptology - ICISC 2007 : 10th International Conference Seoul, Korea, November 29-30, 2007 : proceedings

TL;DR: A Secure Virtual Execution Environment for Untrusted Code and Security-Preserving Asymmetric Protocol Encapsulation are studied.
Journal ArticleDOI

A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks

TL;DR: To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.

Combining private and public key encryption techniques for providing extreme secure environment for an academic institution application

TL;DR: This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively, and is self sufficient in terms of the data that it stores.

Message encryption and decryption on mobile phones

TL;DR: This paper presents an Encryption/Decryption application of messages on both java and Android phones and the method of encryption of message is AES (Advance Encryption System) where the same key that was used to encrypt is used to decrypt.
Journal ArticleDOI

A combinatorial analysis of recent attacks on step reduced SHA-2 family

TL;DR: This analysis explains in a unified way the recent attacks against reduced round SHA-2 in a general class of local collisions and shows that the previously used local collision by Nikolić and Biryukov and Sanadhya and Sarkar are special cases.
References
More filters
Posted Content

New Local Collisions for the SHA-2 Hash Family.

TL;DR: A systematic study of local collisions for the SHA-2 family, where only one local collision due to Gilbert-Handschuh was known, and a general method for finding local collisions is described.
Posted Content

Analysis of Step-Reduced SHA-256.

TL;DR: In this paper, the authors analyzed the security of SHA-256 against fast collision search and showed that the low probability of a single local collision may give rise to a false sense of security.
Book ChapterDOI

Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family

TL;DR: Two different deterministic attacks against 21-step SHA-2 hash family are constructed, and it is provided evidence that the Nikolic-Biryukov differential path is unlikely to yield 21- step collisions for SHA-512.
BookDOI

Selected Areas in Cryptography

TL;DR: The contribution shows that for low cost security applications genus-4 hyperelliptic curves (HEC) can outperform genus-2 HEC and that it can achieve a performance similar to genus-3 HEC, and the implementation results show that a genus- 4 HECC is an alternative cryptosystem to systems based on elliptic curves.
Journal ArticleDOI

A combinatorial analysis of recent attacks on step reduced SHA-2 family

TL;DR: This analysis explains in a unified way the recent attacks against reduced round SHA-2 in a general class of local collisions and shows that the previously used local collision by Nikolić and Biryukov and Sanadhya and Sarkar are special cases.
Related Papers (5)