Efficient collision search attacks on SHA-0
Xiaoyun Wang,Hongbo Yu,Yiqun Lisa Yin +2 more
- pp 1-16
TLDR
Using the new techniques, this paper can find collisions of the full 80-step SHA-0 with complexity less than 239 hash operations.Abstract:
In this paper, we present new techniques for collision search in the hash function SHA-0. Using the new techniques, we can find collisions of the full 80-step SHA-0 with complexity less than 239 hash operations.read more
Citations
More filters
Journal Article
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
TL;DR: Preimage attacks on 3-pass HAVAL and step-reduced MD5 have been studied in this article, where the authors show that the security margin is not as high as expected.
Cryptographic Hash Functions : Recent Results on Cryptanalysis and their Implications on Systems Security
Rüdiger Weis,Stefan Lucks +1 more
TL;DR: This paper describes how current hash functions work, which attacks cryptographic hash functions should defend against, and what had gone wrong now, including the trouble for “Trusted” Computing, due to the “hardwired” use of SHA-1.
Book ChapterDOI
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
Gaoli Wang,Shaohui Wang +1 more
TL;DR: A second pre image differential path is presented for 5-pass HAVAL with probability 2*** 227 and exploited to devise a second preimage attack on 5- pass HAVal .
Book ChapterDOI
Distinguishing attacks on LPMAC based on the full RIPEMD and reduced-step RIPEMD-{256, 320}
TL;DR: The techniques from Wang et al.
References
More filters
Book ChapterDOI
Finding collisions in the full SHA-1
TL;DR: This is the first attack on the full 80-step SHA-1 with complexity less than the 280 theoretical bound, and it is shown that collisions ofSHA-1 can be found with complexityLess than 269 hash operations.
Book ChapterDOI
How to break MD5 and other hash functions
Xiaoyun Wang,Hongbo Yu +1 more
TL;DR: A new powerful attack on MD5 is presented, which unlike most differential attacks, does not use the exclusive-or as a measure of difference, but instead uses modular integer subtraction as the measure.
Journal Article
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques
TL;DR: This paper discusses Cryptography in High Dimensional Tori, a Tool Kit for Finding Small Roots of Bivariate Polynomials over the Integers, and reducing Complexity Assumptions for Statistically-Hiding Commitment.
BookDOI
Advances in Cryptology – CRYPTO 2004
TL;DR: A formal statistical framework for block cipher attacks based on this technique is developed and explicit and compact gain formulas for generalized versions of Matsui’s Algorithm 1 and Algorithm 2 are derived.