Malicious Hashing: Eve's Variant of SHA-1

@inproceedings{Albertini2014MaliciousHE,
  title={Malicious Hashing: Eve's Variant of SHA-1},
  author={Ange Albertini and Jean-Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schl{\"a}ffer},
  booktitle={Selected Areas in Cryptography},
  year={2014}
}
We present collisions for a version of SHA-1 with modified constants, where the colliding payloads are valid binary files. Examples are given of colliding executables, archives, and images. Our malicious SHA-1 instances have round constants that differ from the original ones in only 40 bits (on average). Modified versions of cryptographic standards are typically used on closed systems (e.g., in pay-TV, media and gaming platforms) and aim to differentiate cryptographic components across… CONTINUE READING
Highly Cited
This paper has 19 citations. REVIEW CITATIONS
12 Citations
44 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-10 of 44 references

Exclusive: Secret contract tied NSA and security industry pioneer

  • J. Menn
  • Reuters (December 2013),
  • 1220
Highly Influential
8 Excerpts

A few more notes on NSA random number generators

  • M. Green
  • Blog post (December
  • 2013
1 Excerpt

The NSA is breaking most encryption on the internet

  • B. Schneier
  • Blog post (September
  • 2013
1 Excerpt

The many flaws of Dual EC DRBG

  • M. Green
  • Blog post (September
  • 2013
1 Excerpt

Similar Papers

Loading similar papers…