Analysis of simplified variants of SHA-256

Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

8 Citations (Scopus)

Abstract

In this paper we analyse the role of some of the building blocks of SHA-256. We show that the disturbance-correction strategy is applicable to the SHA-256 architecture and we prove that functions Σ σ are vital for the security of SHA-256 by showing that for a variant without them it is possible to find collisions with complexity 264 hash operations. As a step towards an analysis of the full function, we present the results of our experiments on Hamming weights of expanded messages for differ ent variants of the message expansion and show that there exist low-weight expanded messages for XOR-linearised variants.

Original languageEnglish
Title of host publicationWEWoRC 2005 - Western European Workshop on Research in Cryptology
EditorsChristopher Wolf, Stefan Lucks, Po-Wah Yau
Place of PublicationBonn
PublisherGesellschaft für Informatik
Pages123-134
Number of pages12
VolumeP-74
ISBN (Print)3885794039, 9783885794035
Publication statusPublished - 2005
Event1st Western European Workshop on Research in Cryptology, WEWoRC - 2005 - Leuven, Belgium
Duration: 5 Jul 20057 Jul 2005

Other

Other1st Western European Workshop on Research in Cryptology, WEWoRC - 2005
CountryBelgium
CityLeuven
Period5/07/057/07/05

Fingerprint

Dive into the research topics of 'Analysis of simplified variants of SHA-256'. Together they form a unique fingerprint.

Cite this