Finding collisions in the full SHA-1
Citations
543 citations
495 citations
450 citations
426 citations
358 citations
Cites background from "Finding collisions in the full SHA-..."
...The collision resistance property of SHA-1 has been compromised [25]....
[...]
References
1,583 citations
"Finding collisions in the full SHA-..." refers background or methods in this paper
...For example, applying the new technique of combining near-collision paths into a collision path, we can improve the successful probability of the attack on MD5 from 2−37 to 2−32....
[...]
...In particular, our analysis is built upon the original differential attack on SHA-0 [14], the near collision attack on SHA-0 [1], the multi-block collision techniques [12], as well as the message modification techniques used in the collision search attacks on HAVAL-128, MD4, RIPEMD and MD5 [11,13,12]....
[...]
...For MD5 [12], the complexity of finding the first block near-collision is higher than those of the second block near-collision because of the determination for the bit-difference positions and signs in the last several steps....
[...]
...Some strategies of the attack can be utilized to further improve the attacks on MD5 and SHA-0 etc....
[...]
...Using the idea of multi-block collisions in [7,2,3,12], we can construct two-block collisions using near collisions....
[...]
965 citations
759 citations