Classification and generation of disturbance vectors for collision attacks against SHA-1

@article{Manuel2011ClassificationAG,
  title={Classification and generation of disturbance vectors for collision attacks against SHA-1},
  author={S. Manuel},
  journal={Designs, Codes and Cryptography},
  year={2011},
  volume={59},
  pages={247-263}
}
  • S. Manuel
  • Published 2011
  • Computer Science, Mathematics
  • Designs, Codes and Cryptography
  • The main contribution of this paper is to provide a classification of disturbance vectors used in differential collision attacks against $${\tt{SHA}-1}$$ . We show that all published disturbance vectors can be classified into two types of vectors, type-I and type-II. We present a deterministic algorithm which produce efficient disturbance vectors with respect to any given cost function. We define two simple cost functions to evaluate the efficiency of a candidate disturbance vector. Using our… CONTINUE READING

    Topics from this paper.

    Practical Free-Start Collision Attacks on 76-step SHA-1
    • 18
    • PDF
    Mitigation and Improving SHA-1 Standard Using Collision Detection Approach
    • 6
    • PDF
    Freestart Collision for Full SHA-1
    • 60
    • PDF
    Analysis of Differential Attacks in ARX Constructions
    • 37
    • PDF

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 20 REFERENCES
    Collisions on SHA-0 in One Hour
    • 38
    • PDF
    Finding Good Differential Patterns for Attacks on SHA-1
    • 46
    • PDF
    Finding SHA-1 Characteristics: General Results and Applications
    • 260
    • Highly Influential
    • PDF
    Hash Functions and the (Amplified) Boomerang Attack
    • 90
    • PDF
    Improved Collision Search for SHA-0
    • 28
    • PDF
    Exploiting Coding Theory for Collision Attacks on SHA-1
    • 62
    • PDF
    Differential Collisions in SHA-0
    • 298
    • PDF
    Collisions of SHA-0 and Reduced SHA-1
    • 256
    • PDF