Open AccessJournal Article
Cryptanalysis of block ciphers based on SHA-1 and MD5
Reads0
Chats0
TLDR
A related-key attack against SHACAL-1 is discussed and a method for finding slid pairs for it is presented and simple attacks against MDC-MD5 and the Kaliski-Robshaw block cipher are presented.Abstract:
We cryptanalyse some block cipher proposals that are based on dedicated hash functions SHA-1 and MD5 We discuss a related-key attack against SHACAL-1 and present a method for finding slid pairs for it We also present simple attacks against MDC-MD5 and the Kaliski-Robshaw block cipherread more
Citations
More filters
Journal Article
Security analysis of SHA-256 and sisters
Henri Gilbert,Helena Handschuh +1 more
TL;DR: In this article, the security of SHA-256, SHA-384 and SHA-512 against collision attacks was studied. But the authors concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks also don't apply on the underlying structure.
Book
The Block Cipher Companion
Lars R. Knudsen,Matthew Robshaw +1 more
TL;DR: This book provides a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment and provides an overview of some of the most important cryptanalytic methods.
Posted Content
Update on SHA-1.
Vincent Rijmen,Elisabeth Oswald +1 more
TL;DR: It is shown that for a reduced version of SHA-1, with 53 rounds instead of 80, it is possible to find collisions in less than 280 operations.
Book ChapterDOI
Energy comparison of AES and SHA-1 for ubiquitous computing
Jens-Peter Kaps,Berk Sunar +1 more
TL;DR: A novel ultra- low power SHA-1 design and an energy efficient ultra-low power AES design are presented that can be used to provide the basic security services of encryption and authentication and it is found that SHA- 1 based authentication and encryption is more energy efficient than using AES for payload sizes of 17 bytes or larger.
Cryptography for Ultra-Low Power Devices
TL;DR: The goal of this dissertation is to develop a suite of cryptographic functions for authentication, encryption and integrity that is specifically fashioned to the needs of ultra-low power devices.
References
More filters
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Book ChapterDOI
A design principle for hash functions
TL;DR: Apart from suggesting a generally sound design principle for hash functions, the results give a unified view of several apparently unrelated constructions of hash functions proposed earlier, and suggests changes to other proposed constructions to make a proof of security potentially easier.
Book ChapterDOI
One way hash functions and DES
TL;DR: This work shows three one-way hash functions which are secure if DES is a good random block cipher.
Journal Article
Hash Functions Based on Block Ciphers: A Synthetic Approach
TL;DR: In this paper, a general model for hash functions based on block ciphers is presented, where the size of the hashcode is equal to the block length of the block cipher and the key size is approximately equal to block length.
Book ChapterDOI
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
TL;DR: In this paper, a formal and quantitative treatment of the 64 most basic hash function constructions considered by Preneel, Govaerts, and Vandewalle is provided.