Analysis of simplified variants of SHA-256

Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

8 Citations (Scopus)


In this paper we analyse the role of some of the building blocks of SHA-256. We show that the disturbance-correction strategy is applicable to the SHA-256 architecture and we prove that functions Σ σ are vital for the security of SHA-256 by showing that for a variant without them it is possible to find collisions with complexity 264 hash operations. As a step towards an analysis of the full function, we present the results of our experiments on Hamming weights of expanded messages for differ ent variants of the message expansion and show that there exist low-weight expanded messages for XOR-linearised variants.

Original languageEnglish
Title of host publicationWEWoRC 2005 - Western European Workshop on Research in Cryptology
EditorsChristopher Wolf, Stefan Lucks, Po-Wah Yau
Place of PublicationBonn
PublisherGesellschaft für Informatik
Number of pages12
ISBN (Print)3885794039, 9783885794035
Publication statusPublished - 2005
Event1st Western European Workshop on Research in Cryptology, WEWoRC - 2005 - Leuven, Belgium
Duration: 5 Jul 20057 Jul 2005


Other1st Western European Workshop on Research in Cryptology, WEWoRC - 2005


Dive into the research topics of 'Analysis of simplified variants of SHA-256'. Together they form a unique fingerprint.

Cite this