Exploiting Coding Theory for Collision Attacks on SHA-1

@inproceedings{Pramstaller2005ExploitingCT,
  title={Exploiting Coding Theory for Collision Attacks on SHA-1},
  author={N. Pramstaller and C. Rechberger and V. Rijmen},
  booktitle={IMACC},
  year={2005}
}
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus on SHA-1. We present different linear codes that are used to find low-weight differences that lead to a collision. We extend existing approaches and include recent results in the cryptanalysis of hash functions. With our approach we are able to find differences with very low weight. Based on the weight of these differences we conjecture the complexity for a… Expand
62 Citations
Finding Good Differential Patterns for Attacks on SHA-1
  • 46
  • PDF
Analysis of simplified variants of SHA-256
  • 27
  • PDF
Algebraic Cryptanalysis of 58-Round SHA-1
  • 34
  • PDF
A Distinguisher for the Compression Function of SIMD-512
  • 13
  • PDF
Breaking a New Hash Function Design Strategy Called SMASH
  • 18
  • PDF
Practical Collisions for SHAMATA-256
  • 10
  • PDF
Study the function of building blocks in SHA Family
  • PDF
Cryptanalysis of Round-Reduced HAS-160
  • 11
  • Highly Influenced
  • PDF
Optimal Covering Codes for Finding Near-Collisions
  • 5
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 24 REFERENCES
Finding Good Differential Patterns for Attacks on SHA-1
  • 46
  • Highly Influential
  • PDF
Differential Collisions in SHA-0
  • 300
  • Highly Influential
  • PDF
Finding Collisions in the Full SHA-1
  • 1,517
  • Highly Influential
  • PDF
On the Security of Some Cryptosystems Based on Error-correcting Codes
  • 66
  • PDF
Collisions of SHA-0 and Reduced SHA-1
  • 260
  • PDF
Advances in Cryptology – CRYPTO 2004
  • M. Franklin
  • Computer Science
  • Lecture Notes in Computer Science
  • 2004
  • 705
How to Break MD5 and Other Hash Functions
  • 1,490
  • PDF
Update on SHA-1
  • 136
  • PDF
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
  • 536
  • PDF
Cryptanalysis of MD4
  • H. Dobbertin
  • Mathematics, Computer Science
  • Journal of Cryptology
  • 1998
  • 164
  • PDF
...
1
2
3
...