scispace - formally typeset
Open AccessJournal Article

Cryptanalysis of block ciphers based on SHA-1 and MD5

Reads0
Chats0
TLDR
A related-key attack against SHACAL-1 is discussed and a method for finding slid pairs for it is presented and simple attacks against MDC-MD5 and the Kaliski-Robshaw block cipher are presented.
Abstract
We cryptanalyse some block cipher proposals that are based on dedicated hash functions SHA-1 and MD5 We discuss a related-key attack against SHACAL-1 and present a method for finding slid pairs for it We also present simple attacks against MDC-MD5 and the Kaliski-Robshaw block cipher

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Security analysis of SHA-256 and sisters

TL;DR: In this article, the security of SHA-256, SHA-384 and SHA-512 against collision attacks was studied. But the authors concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks also don't apply on the underlying structure.
Book

The Block Cipher Companion

TL;DR: This book provides a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment and provides an overview of some of the most important cryptanalytic methods.
Posted Content

Update on SHA-1.

TL;DR: It is shown that for a reduced version of SHA-1, with 53 rounds instead of 80, it is possible to find collisions in less than 280 operations.
Book ChapterDOI

Energy comparison of AES and SHA-1 for ubiquitous computing

TL;DR: A novel ultra- low power SHA-1 design and an energy efficient ultra-low power AES design are presented that can be used to provide the basic security services of encryption and authentication and it is found that SHA- 1 based authentication and encryption is more energy efficient than using AES for payload sizes of 17 bytes or larger.

Cryptography for Ultra-Low Power Devices

TL;DR: The goal of this dissertation is to develop a suite of cryptographic functions for authentication, encryption and integrity that is specifically fashioned to the needs of ultra-low power devices.
References
More filters
Proceedings Article

The MD5 Message-Digest Algorithm

TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Book ChapterDOI

A design principle for hash functions

Ivan Damgård
TL;DR: Apart from suggesting a generally sound design principle for hash functions, the results give a unified view of several apparently unrelated constructions of hash functions proposed earlier, and suggests changes to other proposed constructions to make a proof of security potentially easier.
Book ChapterDOI

One way hash functions and DES

TL;DR: This work shows three one-way hash functions which are secure if DES is a good random block cipher.
Journal Article

Hash Functions Based on Block Ciphers: A Synthetic Approach

TL;DR: In this paper, a general model for hash functions based on block ciphers is presented, where the size of the hashcode is equal to the block length of the block cipher and the key size is approximately equal to block length.
Book ChapterDOI

Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV

TL;DR: In this paper, a formal and quantitative treatment of the 64 most basic hash function constructions considered by Preneel, Govaerts, and Vandewalle is provided.
Related Papers (5)