期刊文献+

SHA-256压缩函数的结构安全性 被引量:3

Structure Security of Compress Function of SHA-256
下载PDF
导出
摘要 给出了SHA-256压缩函数的3个变种形式,分别分析了它们抵抗Chabaud-Joux攻击的能力,并与对SHA-256的攻击结果进行比较,其中SHA-2A部分碰撞的复杂度与SHA-256近似,SHA-2B不能以较小复杂度找到碰撞,但是结构上存在其他弱点.SHA-2C的安全强度远远低于SHA-256.作为实例,给出了安全性较为脆弱的SHA-256变种的部分碰撞.结果表明:SHA-256压缩函数的结构选择较大程度地影响其安全性. The paper presents three kinds of variant forms of compress functions of SHA256, and analysis the security of three variants against the Chabaud-Joux attack compared with SHA-256. The complexity of finding a local collision in SHA-2A is similar to SHA-256, SHA-2B does not exist a low complexity collision, but exist other fault in it's structure, while SHA-2C is far insecure than SHA-256. Furthermore, a local collision in the vulnerable variant is presented. It follows that the selection of the compression function' s structure highly affects the complexity of the attack.
出处 《应用科学学报》 CAS CSCD 北大核心 2008年第1期1-5,共5页 Journal of Applied Sciences
基金 国家自然科学基金(No.60573028) 东南大学移动通信国家重点实验室开放基金(No.A200503)资助项目
关键词 HASH函数 碰撞攻击 SHA-256 SHA-256变种 压缩函数 部分碰撞 Hash function collision attack SHA-256 SHA-256 variant compress function local collision
  • 相关文献

参考文献10

  • 1WANG Xiaoyun, FENG Denggou, LAI Xuejia, YU Hongbo.Collisions for Hash functions MD4, MD5, HAVAL-128 and RIPEMD [C]//Rump Session of Crypto' 04 and IACR ePrint Archive, August 2004.
  • 2WANG Xiaoyun, YU Hongbo. How to break MD5 and other Hash functions [ C]//Advances in Cryptology - Eurocrypt'05, Lecture Notes in Computer Science, 2005, 3494 : 19 - 35.
  • 3WANG Xiaoyun, YU Hongbo. Efficient collision search attacks on SHA-0 [ C ]//Advances in Cryptology-Crypto' 05, Lecture Notes in Computer Science, 2005,3621 : 1 - 16.
  • 4WANG Xiaoyun. Finding collisions in the full SHA-1 [ C ]//Advances in Cryptology-Crypto05, Lecture Notes in Computer Science, 2005,3621:17 -36.
  • 5Nalional Institute of Standards and Technology. Secure Hash Standard (SHS)[ S]. Federal Information Processing Standards (FIPS) Publication, 2004, 180-2.
  • 6MATUSIEEICZ K, PIEPRZYK J, PRAMSTALLER N, RECHBERGER C, RIJMEN V. Analysis of simplied variants of SHA-256 [ C ]//In WEWoRC 2005 Western European Workshop in Cryptology, 2005 : 123 - 134.
  • 7YOSHIDA H, BIRYUKOV A. Analysis of a SHA-256 variant [C]//Selected Areas in Cryptography (SAC 2005 ), Kingston, Ontario, 2005:245 - 260.
  • 8GILBERT H, HANDSCHUH H. Security analysis of SHA-256 and sisters [C]//Selected Areas in Cryptography' 03, Lecture Notes in Computer Science, 2003, 3006:175 - 193.
  • 9CHABAUD F, Joux A. Differential collisions in SHA-0 [ C ]//Advances in Crypyology-CRYPYO ' 98, Lecture Notes in Computer Science, 1998,1462 : 56 - 71.
  • 10HAWKES P, PADDON M, ROSE G G. On corrective patterns for the SHA-2 family [EB/OL]. Cryptology ePrint Archive, August, 2004/207 [ 2006-10-01 ]. http:// eprint. iacr. org,/2004/207.

同被引文献7

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部