Open AccessJournal Article
Security analysis of SHA-256 and sisters
Henri Gilbert,Helena Handschuh +1 more
TLDR
In this article, the security of SHA-256, SHA-384 and SHA-512 against collision attacks was studied. But the authors concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks also don't apply on the underlying structure.Abstract:
This paper studies the security of SHA-256, SHA-384 and SHA-512 against collision attacks and provides some insight into the security properties of the basic building blocks of the structure. It is concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks apply. Differential and linear attacks also don't apply on the underlying structure. However we show that slightly simplified versions of the hash functions are surprisingly weak : whenever symmetric constants and initialization values are used throughout the computations, and modular additions are replaced by exclusive or operations, symmetric messages hash to symmetric digests. Therefore the complexity of collision search on these modified hash functions potentially becomes as low as one wishes.read more
Citations
More filters
Book ChapterDOI
A Secure and Distributed Construction Document Management System Using Blockchain
TL;DR: Smart contracts are deployed to facilitate document approval workflows to support processes such as design review and request for information in construction projects and a distributed construction document management system using Blockchain and distributed content-addressable storage technologies is presented.
Journal ArticleDOI
End-to-End Voting with Non-Permissioned and Permissioned Ledgers
TL;DR: A decentralised end-to-end voting platform (from voter to candidate) based on the block-chain technology, which study and exploit both the non-permissioned ledger of Bitcoin, and the MultiChain permissioned ledger, which is a permissioned public ledger.
Book ChapterDOI
Collision-Resistant usage of MD5 and SHA-1 via message preprocessing
Michael Szydlo,Yiqun Lisa Yin +1 more
TL;DR: A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm as discussed by the authors, and the natural response has been to evaluate the extent to which various protocols actually depend on collision resistance for their security, and potentially schedule an upgrade to a stronger hash function.
Journal ArticleDOI
SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey
TL;DR: The work presents a comprehensive review of the different design techniques available in the literature for SHA-2 acceleration, guiding the designer through the identification of the appropriate technique mixes which meet the constraints of any given application.
ECRYPT Yearly Report on Algorithms and Keysizes (2007-2008)
TL;DR: The report provides a list of recommended cryptographic algorithms and recommended keysizes and other parameter settings to reach specified security objectives and the fact that a specific algorithm or variant thereof is not included should not be taken as indication that particular algorithm is insecure.
References
More filters
Proceedings Article
The MD5 Message-Digest Algorithm
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Book ChapterDOI
A design principle for hash functions
TL;DR: Apart from suggesting a generally sound design principle for hash functions, the results give a unified view of several apparently unrelated constructions of hash functions proposed earlier, and suggests changes to other proposed constructions to make a proof of security potentially easier.
Book ChapterDOI
The MD4 Message-Digest Algorithm
TL;DR: The MD4 message digest algorithm takes an input message of arbitrary length and produces an output 128-bit "fingerprint" or "message digest", in such a way that it is (hopefully) computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest.
Book ChapterDOI
RIPEMD-160: A Strengthened Version of RIPEMD
TL;DR: A new version of RIPEMD with a 160-bit result is proposed, as well as a plug-in substitute for RIPEMd with a 128- bit result, and the software performance of several MD4-based algorithms is compared.
Book ChapterDOI
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
TL;DR: In this paper, a formal and quantitative treatment of the 64 most basic hash function constructions considered by Preneel, Govaerts, and Vandewalle is provided.