scispace - formally typeset
Open AccessJournal Article

Security analysis of SHA-256 and sisters

Henri Gilbert, +1 more
- 01 Jan 2004 - 
- pp 175-193
TLDR
In this article, the security of SHA-256, SHA-384 and SHA-512 against collision attacks was studied. But the authors concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks also don't apply on the underlying structure.
Abstract
This paper studies the security of SHA-256, SHA-384 and SHA-512 against collision attacks and provides some insight into the security properties of the basic building blocks of the structure. It is concluded that neither Chabaud and Joux's attack, nor Dobbertin-style attacks apply. Differential and linear attacks also don't apply on the underlying structure. However we show that slightly simplified versions of the hash functions are surprisingly weak : whenever symmetric constants and initialization values are used throughout the computations, and modular additions are replaced by exclusive or operations, symmetric messages hash to symmetric digests. Therefore the complexity of collision search on these modified hash functions potentially becomes as low as one wishes.

read more

Citations
More filters
Book ChapterDOI

Understanding Modern Banking Ledgers Through Blockchain Technologies: Future of Transaction Processing and Smart Contracts on the Internet of Money

TL;DR: This chapter provides a brief overview of the core aspects of blockchain technology, as well as the second-generation contract-based developments, and discusses key issues that must be considered in developing ledger based technologies in a banking context.
Journal ArticleDOI

Security in Internet of Things: issues, challenges, taxonomy, and architecture

TL;DR: This paper discusses various research challenges that still exist in the literature, which provides better understanding of the problem, current solution space, and future research directions to defend IoT against different attacks.
Journal ArticleDOI

A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory

TL;DR: The Blockchain architecture, which is an emerging scheme for constructing the distributed networks, is introduced to reshape the traditional IIoT architecture to form a new multicenter partially decentralized architecture that provides better security and privacy protection than the traditional architecture.
Proceedings ArticleDOI

A brief survey of Cryptocurrency systems

TL;DR: A perspective on how Cryptocurrencies mine is surveyed and compared and contrast current mining techniques as used by major Cryptocurrency, and the strengths, weaknesses, and possible threats to each mining strategy are evaluated.
Journal ArticleDOI

A Technical Approach to the Energy Blockchain in Microgrids

TL;DR: In this article, a real-time attribution of power losses to each transaction involving one generator and one load node is done by defining some suitable indices, and the experimental section of the paper considers a medium voltage microgrid and two different operational scenarios.
References
More filters
Book ChapterDOI

Analysis of SHA-1 in Encryption Mode

TL;DR: It is concluded that none of these attacks can be applied successfully in practice to SHA-1, and a block cipher named SHACAL is investigated based on these principles.
Journal Article

Cryptanalysis of block ciphers based on SHA-1 and MD5

TL;DR: A related-key attack against SHACAL-1 is discussed and a method for finding slid pairs for it is presented and simple attacks against MDC-MD5 and the Kaliski-Robshaw block cipher are presented.
Journal Article

Rectangle attacks on 49-round SHACAL-1

TL;DR: In this article, the authors presented rectangle attacks on 49 rounds out of 80 rounds of SHACAL-1 and the attacks require 2 151.9 chosen plaintexts or ciphertexts and have time complexity of 2 508.5 49 rounds.
Proceedings ArticleDOI

Differential cryptanalysis of hash functions based on block ciphers

TL;DR: A differential attack on several hash functions based on a block cipher with the emphasis on the results for cases where DES [8] is the underlying block cipher.
Book ChapterDOI

The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free

TL;DR: In this paper, a method for finding collisions in each of the parallel lines of the MD4 hash function is presented, and the collision search procedure requires only a few seconds computing time, and it is shown that although the modifications of MD4 compression function Used in RIPEMD introduce additional constraints in the cryptanalysis as Compared with Dobbertin's attack, these modifications do not result in an increase of collision search computation time.