scispace - formally typeset
Open AccessJournal Article

Security analysis of SHA-256 and sisters

Henri Gilbert, +1 more
- 01 Jan 2004 - 
- pp 175-193
TLDR
In this article, the security of SHA-256, SHA-384 and SHA-512 against collision attacks was studied. But the authors concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks also don't apply on the underlying structure.
Abstract
This paper studies the security of SHA-256, SHA-384 and SHA-512 against collision attacks and provides some insight into the security properties of the basic building blocks of the structure. It is concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks apply. Differential and linear attacks also don't apply on the underlying structure. However we show that slightly simplified versions of the hash functions are surprisingly weak : whenever symmetric constants and initialization values are used throughout the computations, and modular additions are replaced by exclusive or operations, symmetric messages hash to symmetric digests. Therefore the complexity of collision search on these modified hash functions potentially becomes as low as one wishes.

read more

Citations
More filters
Book ChapterDOI

Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money

TL;DR: This chapter provides a brief overview of the core aspects of blockchain technology, as well as the second-generation contract-based developments, and discusses key issues that must be considered in developing ledger based technologies in a banking context.
Journal ArticleDOI

Security in Internet of Things: issues, challenges, taxonomy, and architecture

TL;DR: This paper discusses various research challenges that still exist in the literature, which provides better understanding of the problem, current solution space, and future research directions to defend IoT against different attacks.
Journal ArticleDOI

A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory

TL;DR: The Blockchain architecture, which is an emerging scheme for constructing the distributed networks, is introduced to reshape the traditional IIoT architecture to form a new multicenter partially decentralized architecture that provides better security and privacy protection than the traditional architecture.
Proceedings ArticleDOI

A brief survey of Cryptocurrency systems

TL;DR: A perspective on how Cryptocurrencies mine is surveyed and compared and contrast current mining techniques as used by major Cryptocurrency, and the strengths, weaknesses, and possible threats to each mining strategy are evaluated.
Journal ArticleDOI

A Technical Approach to the Energy Blockchain in Microgrids

TL;DR: In this article, a real-time attribution of power losses to each transaction involving one generator and one load node is done by defining some suitable indices, and the experimental section of the paper considers a medium voltage microgrid and two different operational scenarios.
References
More filters
Journal Article

Differential collisions in SHA-0

TL;DR: In this paper, the authors presented a method for finding collisions in SHA-0 which is related to differential cryptanalysis of block ciphers and obtained a theoretical attack on the compression function SHA-O with complexity 2 61, which is thus better than the birthday paradox attack.
Journal ArticleDOI

Cryptanalysis of MD4

TL;DR: The methods developed to attack RIPEMD can be modified and supplemented such that it is possible to break the full MD4, while previously only partial attacks were known.
Book ChapterDOI

On the need for multipermutations: Cryptanalysis of MD4 and SAFER

TL;DR: It is argued that boxes which fail to be multipermutations can open the way to unsuspected attacks.
Book

Integrity primitives for secure information systems : final report of RACE Integrity Primitives Evaluation RIPE-RACE 1040

TL;DR: The MDC-4, RIPEMD, RIPE-MAC, IBC-hash, SKID, RSA, COMSET, and RSA key generation guidelines for arithmetic computation are described.
Book ChapterDOI

An Attack on the Last Two Rounds of MD4

TL;DR: It is shown that if the three round MD4 algorithm is stripped of its first round, it is possible to find for a given (initial) input value two different messages hashing to the same output.