SHA-1
Contents
1 Specification
- digest size: 160 bits
- max. message length: < 264 bits
- compression function: 512-bit message block, 160-bit chaining variable
- Specification: FIPS 180-2 Secure Hash Standard
2 Cryptanalysis
2.1 Best Known Results
The best collision attack on full SHA-1 was published by Wang et al. It has complexity of 269 hash evaluations. The best collision example, a 70-step collision for SHA-1, was published by DeCanniere, Mendel and Rechberger.
2.2 Collision Attacks
Christophe De Canni\`ere, Florian Mendel, Christian Rechberger - Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
- Selected Areas in Cryptography 4876:56-73,2007
- http://dx.doi.org/10.1007/978-3-540-77360-3_4
 BibtexAuthor : Christophe De Canni\`ere, Florian Mendel, Christian Rechberger
 Title : Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
 In : Selected Areas in Cryptography -
 Address :
 Date : 2007
Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai - Algebraic Cryptanalysis of 58-Round SHA-1
- FSE 4593:349-365,2007
- http://dx.doi.org/10.1007/978-3-540-74619-5_22
 BibtexAuthor : Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai
 Title : Algebraic Cryptanalysis of 58-Round SHA-1
 In : FSE -
 Address :
 Date : 2007
Christophe De Canni\`ere, Christian Rechberger - Finding SHA-1 Characteristics: General Results and Applications
- ASIACRYPT 4284:1-20,2006
- http://dx.doi.org/10.1007/11935230_1
 BibtexAuthor : Christophe De Canni\`ere, Christian Rechberger
 Title : Finding SHA-1 Characteristics: General Results and Applications
 In : ASIACRYPT -
 Address :
 Date : 2006
Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - Finding Collisions in the Full SHA-1
- CRYPTO 3621:17-36,2005
- http://dx.doi.org/10.1007/11535218_2
 BibtexAuthor : Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
 Title : Finding Collisions in the Full SHA-1
 In : CRYPTO -
 Address :
 Date : 2005
Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby - Collisions of SHA-0 and Reduced SHA-1
- EUROCRYPT 3494:36-57,2005
- http://dx.doi.org/10.1007/11426639_3
 BibtexAuthor : Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby
 Title : Collisions of SHA-0 and Reduced SHA-1
 In : EUROCRYPT -
 Address :
 Date : 2005
Vincent Rijmen, Elisabeth Oswald - Update on SHA-1
- CT-RSA 3376:58-71,2005
- http://dx.doi.org/10.1007/b105222
 BibtexAuthor : Vincent Rijmen, Elisabeth Oswald
 Title : Update on SHA-1
 In : CT-RSA -
 Address :
 Date : 2005
2.3 Preimage Attacks
Christophe De Canni\`ere, Christian Rechberger - Preimages for Reduced SHA-0 and SHA-1
- CRYPTO 5157:179-202,2008
- http://dx.doi.org/10.1007/978-3-540-85174-5_11
 BibtexAuthor : Christophe De Canni\`ere, Christian Rechberger
 Title : Preimages for Reduced SHA-0 and SHA-1
 In : CRYPTO -
 Address :
 Date : 2008
2.4 Others
Antoine Joux, Thomas Peyrin - Hash Functions and the (Amplified) Boomerang Attack
- CRYPTO 4622:244--263,2007
- http://dx.doi.org/10.1007/978-3-540-74143-5_14
 BibtexAuthor : Antoine Joux, Thomas Peyrin
 Title : Hash Functions and the (Amplified) Boomerang Attack
 In : CRYPTO -
 Address :
 Date : 2007
Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen - The Impact of Carries on the Complexity of Collision Attacks on SHA-1
- FSE 4047:278-292,2006
- http://dx.doi.org/10.1007/11799313_18
 BibtexAuthor : Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
 Title : The Impact of Carries on the Complexity of Collision Attacks on SHA-1
 In : FSE -
 Address :
 Date : 2006
Charanjit S. Jutla, Anindya C. Patthak - Provably Good Codes for Hash Function Design
- Selected Areas in Cryptography 4356:376-393,2006
- http://dx.doi.org/10.1007/978-3-540-74462-7_26
 BibtexAuthor : Charanjit S. Jutla, Anindya C. Patthak
 Title : Provably Good Codes for Hash Function Design
 In : Selected Areas in Cryptography -
 Address :
 Date : 2006
Norbert Pramstaller, Christian Rechberger, Vincent Rijmen - Impact of Rotations in SHA-1 and Related Hash Functions
- Selected Areas in Cryptography 3897:261-275,2005
- http://dx.doi.org/10.1007/11693383_18
 BibtexAuthor : Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
 Title : Impact of Rotations in SHA-1 and Related Hash Functions
 In : Selected Areas in Cryptography -
 Address :
 Date : 2005
Akashi Satoh - Hardware Architecture and Cost Estimates for Breaking SHA-1
- ISC 3650:259-273,2005
- http://dx.doi.org/10.1007/11556992_19
 BibtexAuthor : Akashi Satoh
 Title : Hardware Architecture and Cost Estimates for Breaking SHA-1
 In : ISC -
 Address :
 Date : 2005
