<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://ehash.iaik.tugraz.at/api.php?action=feedcontributions&amp;user=SManuel&amp;feedformat=atom</id>
	<title>The ECRYPT Hash Function Website - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://ehash.iaik.tugraz.at/api.php?action=feedcontributions&amp;user=SManuel&amp;feedformat=atom"/>
	<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/wiki/Special:Contributions/SManuel"/>
	<updated>2024-07-08T07:39:32Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.3</generator>
	<entry>
		<id>https://ehash.iaik.tugraz.at/index.php?title=SHA-0&amp;diff=1991</id>
		<title>SHA-0</title>
		<link rel="alternate" type="text/html" href="https://ehash.iaik.tugraz.at/index.php?title=SHA-0&amp;diff=1991"/>
		<updated>2008-04-01T11:26:37Z</updated>

		<summary type="html">&lt;p&gt;SManuel: /* Collision Attacks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Specification ==&lt;br /&gt;
&lt;br /&gt;
* digest size: 160 bits&lt;br /&gt;
* max. message length: &amp;lt; 2&amp;lt;sup&amp;gt;64&amp;lt;/sup&amp;gt; bits&lt;br /&gt;
* compression function: 512-bit message block, 160-bit chaining variable&lt;br /&gt;
* Specification: FIPS 180 Secure Hash Standard&lt;br /&gt;
&lt;br /&gt;
== Cryptanalysis ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Best Known Results ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Generic Attacks ===&lt;br /&gt;
* [[GenericAttacksMerkleDamgaard| Generic Attacks on the Merkle-Damgaard Construction ]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Collision Attacks ===&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{fesManuelP08,&lt;br /&gt;
  author    = {Stephane Manuel and Thomas Peyrin},&lt;br /&gt;
  title = {Collisions on SHA-0 in One Hour},&lt;br /&gt;
  booktitle = {FSE},&lt;br /&gt;
  year = {2008},&lt;br /&gt;
  editor = {Kaisa Nyberg},&lt;br /&gt;
  series = {LNCS},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  abstract = {At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applied their new theoretical results to SHA-1 and provided new improvements for the cryptanalysis of this algorithm. In this paper, we concentrate on the case of SHA-0. First, we show that the previous perturbation vectors used in all known attacks are not optimal and we provide a new 2-block one. The problem of the possible existence of message modifications for this vector is tackled by the utilization of auxiliary differentials from the boomerang attack, relatively simple to use. Finally, we are able to produce the best collision attack against SHA-0 so far, with a measured complexity of 2^{33,6} hash function calls. Finding one collision for SHA-0 takes us approximatively one hour of computation on an average PC.},&lt;br /&gt;
  note = {To appear},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{asiacryptNaitoSSYKO06,&lt;br /&gt;
  author    = {Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta},&lt;br /&gt;
  title     = {Improved Collision Search for SHA-0},&lt;br /&gt;
  pages     = {21-36},&lt;br /&gt;
  url        = {http://dx.doi.org/10.1007/11935230_2},&lt;br /&gt;
  editor    = {Xuejia Lai and Kefei Chen},&lt;br /&gt;
  booktitle = {ASIACRYPT},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  series    = {LNCS},&lt;br /&gt;
  volume    = {4284},&lt;br /&gt;
  year      = {2006},&lt;br /&gt;
  isbn      = {3-540-49475-8},&lt;br /&gt;
  abstract  = {At CRYPTO 2005, Xiaoyun Wang, Hongbo Yu and Yiqun Lisa Yin proposed a collision attack on SHA-0 that could generate a collision with complexity $2^39$ SHA-0 hash operations. Although the method of Wang et al. can find messages that satisfy the sufficient conditions in steps 1 to 20 by using message modification, it makes no mention of the message modifications needed to yield satisfaction of the sufficient conditions in steps 21 and onwards. In this paper, first, we give sufficient conditions for the steps from step 21, and propose submarine modification as the message modification technique that will ensure satisfaction of the sufficient conditions from steps 21 to 24. Submarine modification is an extension of the multi-message modification used in collision attacks on the MD-family. Next, we point out that the sufficient conditions given by Wang et al. are not enough to generate a collision with high probability; we rectify this shortfall by introducing two new sufficient conditions. The combination of our newly found sufficient conditions and submarine modification allows us to generate a collision with complexity $2^36$ SHA-0 hash operations. At the end of this paper, we show the example of a collision generated by applying our proposals.},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{cryptoWangYY05,&lt;br /&gt;
  author    = {Xiaoyun Wang and Hongbo Yu and Yiqun Lisa Yin},&lt;br /&gt;
  title     = {Efficient Collision Search Attacks on SHA-0},&lt;br /&gt;
  booktitle = {CRYPTO},&lt;br /&gt;
  year      = {2005},&lt;br /&gt;
  pages     = {1-16},&lt;br /&gt;
  url        = {http://dx.doi.org/10.1007/11535218_1},&lt;br /&gt;
  editor    = {Victor Shoup},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  series    = {LNCS},&lt;br /&gt;
  volume    = {3621},&lt;br /&gt;
  isbn      = {3-540-28114-2},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{eurocryptBihamCJCLJ05,&lt;br /&gt;
  author = {Eli Biham and Rafi Chen and Antoine Joux and Patrick Carribault and Christophe Lemuet and William Jalby},&lt;br /&gt;
  title = {Collisions of SHA-0 and Reduced SHA-1},&lt;br /&gt;
  booktitle = {EUROCRYPT},&lt;br /&gt;
  year = {2005},&lt;br /&gt;
  pages = {36-57},&lt;br /&gt;
  abstract = {In this paper we describe improvements to the techniques used to cryptanalyze SHA-0 and introduce the first results on SHA-1. The results include a generic multi-block technique that uses near-collisions in order to find collisions, and a four-block collision of SHA-0 found using this technique with complexity 251. Then, extension of this and prior techniques are presented, that allow us to find collisions of reduced versions of SHA-1. We give collisions of variants with up to 40 rounds, and show the complexities of longer variants. These techniques show that collisions up to about 53–58 rounds can still be found faster than by birthday attacks. Part of the results of this paper were given by the first author in an invited talk in SAC 2004, Waterloo, Canada.},&lt;br /&gt;
  editor = {Ronald Cramer},&lt;br /&gt;
  volume = {3494},&lt;br /&gt;
  series = {LNCS},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  isbn = {3-540-25910-4},&lt;br /&gt;
  url = {http://dx.doi.org/10.1007/11426639_3},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{cryptoBihamC04,&lt;br /&gt;
  author    = {Eli Biham and Rafi Chen},&lt;br /&gt;
  title     = {Near-Collisions of SHA-0},&lt;br /&gt;
  booktitle = {CRYPTO},&lt;br /&gt;
  year      = {2004},&lt;br /&gt;
  pages     = {290-305},&lt;br /&gt;
  url        = {http://springerlink.metapress.com/openurl.asp?genre=article{\&amp;amp;}issn=0302-9743{\&amp;amp;}volume=3152{\&amp;amp;}spage=290},&lt;br /&gt;
  editor    = {Matthew K. Franklin},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  series    = {LNCS},&lt;br /&gt;
  volume    = {3152},&lt;br /&gt;
  isbn      = {3-540-22668-0},&lt;br /&gt;
  editor    = {Matthew K. Franklin},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  series    = {LNCS},&lt;br /&gt;
  volume    = {3152},&lt;br /&gt;
  isbn      = {3-540-22668-0},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&amp;lt;bibtex&amp;gt;&lt;br /&gt;
@inproceedings{cryptoChabaudJ98,&lt;br /&gt;
  author    = {Florent Chabaud and Antoine Joux},&lt;br /&gt;
  title     = {Differential Collisions in SHA-0},&lt;br /&gt;
  booktitle = {CRYPTO},&lt;br /&gt;
  year      = {1998},&lt;br /&gt;
  pages     = {56-71},&lt;br /&gt;
  url        = {http://link.springer.de/link/service/series/0558/bibs/1462/14620056.htm},&lt;br /&gt;
  editor    = {Hugo Krawczyk},&lt;br /&gt;
  publisher = {Springer},&lt;br /&gt;
  series    = {LNCS},&lt;br /&gt;
  volume    = {1462},&lt;br /&gt;
  isbn      = {3-540-64892-5},&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/bibtex&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Second Preimage Attacks ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Preimage Attacks ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Others ===&lt;/div&gt;</summary>
		<author><name>SManuel</name></author>
		
	</entry>
</feed>