Difference between revisions of "SHA-256/224"
From The ECRYPT Hash Function Website
|  (→Collision Attacks) | Crechberger (talk | contribs)  | ||
| Line 10: | Line 10: | ||
| === Best Known Results === | === Best Known Results === | ||
| − | + | Collision attacks up to 21 out of 64 steps. Other non random behavior up to 25 steps. Both results are due to Nicolic and Biryukov. | |
| ---- | ---- | ||
| Line 19: | Line 19: | ||
| === Collision Attacks === | === Collision Attacks === | ||
| + | |||
| + | <bibtex> | ||
| + | |||
| + | @inproceedings{fseNicolicB08, | ||
| + |   author    = {Ivica Nikolic and Alex Biryukov}, | ||
| + |   title = {Collisions for Step-Reduced SHA-256}, | ||
| + |   booktitle = {FSE}, | ||
| + |   year = {2008}, | ||
| + |   editor = {Kaisa Nyberg}, | ||
| + |   series = {LNCS}, | ||
| + |   publisher = {Springer}, | ||
| + |   note = {To appear}, | ||
| + | } | ||
| + | </bibtex> | ||
| + | |||
| + | |||
| + | |||
| <bibtex> | <bibtex> | ||
| @inproceedings{iciscSanadhyaS07, | @inproceedings{iciscSanadhyaS07, | ||
| Line 95: | Line 112: | ||
| } | } | ||
| </bibtex> | </bibtex> | ||
| − | |||
Revision as of 18:27, 21 March 2008
Contents
1 Specification
- digest size: 256 bits
- max. message length: < 264 bits
- compression function: 512-bit message block, 256-bit chaining variable
- Specification: FIPS 180-2 Secure Hash Standard
2 Cryptanalysis
2.1 Best Known Results
Collision attacks up to 21 out of 64 steps. Other non random behavior up to 25 steps. Both results are due to Nicolic and Biryukov.
2.2 Generic Attacks
2.3 Collision Attacks
Ivica Nikolic, Alex Biryukov - Collisions for Step-Reduced SHA-256
Somitra Kumar Sanadhya, Palash Sarkar - New Local Collisions for the SHA-2 Hash Family
- ICISC 4817:193-205,2007
- http://dx.doi.org/10.1007/978-3-540-76788-6_16
 BibtexAuthor : Somitra Kumar Sanadhya, Palash Sarkar
 Title : New Local Collisions for the SHA-2 Hash Family
 In : ICISC -
 Address :
 Date : 2007
Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen - Analysis of Step-Reduced SHA-256
- FSE 4047:126-143,2006
- http://dx.doi.org/10.1007/11799313_9
 BibtexAuthor : Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
 Title : Analysis of Step-Reduced SHA-256
 In : FSE -
 Address :
 Date : 2006
Hirotaka Yoshida, Alex Biryukov - Analysis of a SHA-256 Variant
- Selected Areas in Cryptography 3897:245-260,2005
- http://dx.doi.org/10.1007/11693383_17
 BibtexAuthor : Hirotaka Yoshida, Alex Biryukov
 Title : Analysis of a SHA-256 Variant
 In : Selected Areas in Cryptography -
 Address :
 Date : 2005
Henri Gilbert, Helena Handschuh - Security Analysis of SHA-256 and Sisters
- Selected Areas in Cryptography 3006:175-193,2003
- http://springerlink.metapress.com/openurl.asp?genre=article{\&}issn=0302-9743{\&}volume=3006{\&}spage=175
 BibtexAuthor : Henri Gilbert, Helena Handschuh
 Title : Security Analysis of SHA-256 and Sisters
 In : Selected Areas in Cryptography -
 Address :
 Date : 2003
