Exploiting Coding Theory for Collision Attacks on SHA-1

@inproceedings{Pramstaller2005ExploitingCT,
  title={Exploiting Coding Theory for Collision Attacks on SHA-1},
  author={Norbert Pramstaller and Christian Rechberger and Vincent Rijmen},
  booktitle={IMACC},
  year={2005}
}
  • Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
  • Published in IMACC 2005
  • Computer Science
  • In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus on SHA-1. We present different linear codes that are used to find low-weight differences that lead to a collision. We extend existing approaches and include recent results in the cryptanalysis of hash functions. With our approach we are able to find differences with very low weight. Based on the weight of these differences we conjecture the complexity for a… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 45 CITATIONS

    Differential Attacks on Reduced RIPEMD-160

    VIEW 5 EXCERPTS
    CITES METHODS
    HIGHLY INFLUENCED

    Analysis of Modern Dedicated Cryptographic Hash Functions

    VIEW 16 EXCERPTS
    CITES METHODS
    HIGHLY INFLUENCED

    Cryptanalysis of Reduced Variants of the FORK-256 Hash Function

    VIEW 6 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Cryptanalysis of Round-Reduced HAS-160

    VIEW 8 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Financial Cryptography and Data Security

    VIEW 8 EXCERPTS
    CITES METHODS & BACKGROUND
    HIGHLY INFLUENCED

    Analysis of Step-Reduced SHA-256

    VIEW 3 EXCERPTS
    CITES METHODS & BACKGROUND

    Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    VIEW 1 EXCERPT
    CITES BACKGROUND

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 16 REFERENCES

    Update on SHA-1

    VIEW 7 EXCERPTS

    Differential Collisions in SHA-0

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    A method for finding codewords of small weight

    VIEW 6 EXCERPTS
    HIGHLY INFLUENTIAL

    Finding Good Differential Patterns for Attacks on SHA-1

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Near-Collisions of SHA-0

    VIEW 5 EXCERPTS
    HIGHLY INFLUENTIAL

    A probabilistic algorithm for computing minimum weights of large error-correcting codes

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Finding Collisions in the Full SHA-1

    VIEW 6 EXCERPTS
    HIGHLY INFLUENTIAL