메뉴 건너뛰기




Volumn 3796 LNCS, Issue , 2005, Pages 78-95

Exploiting coding theory for collision attacks on SHA-1

Author keywords

Collision; Cryptanalysis; Hash function; Linear code; Low weight vector; SHA 1

Indexed keywords

CODES (SYMBOLS); COLLISION AVOIDANCE; COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; LINEAR SYSTEMS;

EID: 33646824396     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11586821_7     Document Type: Conference Paper
Times cited : (40)

References (17)
  • 1
    • 35048892549 scopus 로고    scopus 로고
    • Near-collisions of SHA-0
    • Proceedings of CRYPTO 2004. Springer
    • Eli Biham and Rafi Chen. Near-Collisions of SHA-0. In Proceedings of CRYPTO 2004, volume 3152 of LNCS, pages 290-305. Springer, 2004.
    • (2004) LNCS , vol.3152 , pp. 290-305
    • Biham, E.1    Chen, R.2
  • 2
    • 24944584156 scopus 로고    scopus 로고
    • Collisions of SHA-0 and reduced SHA-1
    • Proceedings of EUROCRYPT 2005. Springer
    • Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, and William Jalby. Collisions of SHA-0 and Reduced SHA-1. In Proceedings of EUROCRYPT 2005, volume 3494 of LNCS, pages 36-57. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 36-57
    • Biham, E.1    Chen, R.2    Joux, A.3    Carribault, P.4    Lemuet, C.5    Jalby, W.6
  • 3
    • 0031675932 scopus 로고    scopus 로고
    • A new algorithm for-finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
    • Anne Canteaut and Florent Chabaud. A New Algorithm for-Finding Minimum-Weight Words in a Linear Code: Application to McEliece's Cryptosystem and to Narrow-Sense BCH Codes of Length 511. IEEE Transactions on Information Theory, 44(1): 367-378, 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.1 , pp. 367-378
    • Canteaut, A.1    Chabaud, F.2
  • 4
    • 84948963042 scopus 로고
    • On the security of some cryptosystems based on error-correcting codes
    • Proceedings of EUROCRYPT '94. Springer
    • Florent Chabaud. On the Security of Some Cryptosystems Based on Error-correcting Codes. In Proceedings of EUROCRYPT '94, volume 950 of LNCS, pages 131-139. Springer, 1995.
    • (1995) LNCS , vol.950 , pp. 131-139
    • Chabaud, F.1
  • 5
    • 84957643546 scopus 로고    scopus 로고
    • Differential collisions in SHA-0
    • Proceedings of CRYPTO '98. Springer
    • Florent Chabaud and Antoine Joux. Differential Collisions in SHA-0. In Proceedings of CRYPTO '98, volume 1462 of LNCS, pages 56-71. Springer, 1998.
    • (1998) LNCS , vol.1462 , pp. 56-71
    • Chabaud, F.1    Joux, A.2
  • 6
    • 84958953847 scopus 로고    scopus 로고
    • Cryptanalysis of MD4
    • Proceedings of Fast Software Encryption. Springer
    • Hans Dobbertin. Cryptanalysis of MD4. In Proceedings of Fast Software Encryption, volume 1039 of LNCS, pages 53-69. Springer, 1996.
    • (1996) LNCS , vol.1039 , pp. 53-69
    • Dobbertin, H.1
  • 9
    • 0024078914 scopus 로고
    • A probabilistic algorithm for computing minimum weights of large error-correcting codes
    • Jeffrey S. Leon. A probabilistic algorithm for computing minimum weights of large error-correcting codes. IEEE Transactions on Information Theory, 34(5):1354-1359, 1988.
    • (1988) IEEE Transactions on Information Theory , vol.34 , Issue.5 , pp. 1354-1359
    • Leon, J.S.1
  • 10
    • 33646841956 scopus 로고    scopus 로고
    • Finding good differential patterns for attacks on SHA-1
    • Krystian Matusiewicz and Josef Pieprzyk. Finding good differential patterns for attacks on SHA-1. In Proceedings of WCC 2005. Available online at http://www.ics.mq.edu.au/-kmatus/FindingGD.pdf.
    • Proceedings of WCC 2005
    • Matusiewicz, K.1    Pieprzyk, J.2
  • 11
    • 4043135942 scopus 로고    scopus 로고
    • August
    • National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard, August 2002. Available online at http://www.itl.nist.gov/ fipspubs/.
    • (2002) FIPS-180-2: Secure Hash Standard
  • 12
    • 24144478826 scopus 로고    scopus 로고
    • Update on SHA-1
    • Proceedings of CTRSA 2005. Springer
    • Vincent Rijmen and Elisabeth Oswald. Update on SHA-1. In Proceedings of CTRSA 2005, volume 3376 of LNCS, pages 58-71. Springer, 2005.
    • (2005) LNCS , vol.3376 , pp. 58-71
    • Rijmen, V.1    Oswald, E.2
  • 13
    • 84964937021 scopus 로고
    • A method for finding codewords of small weight
    • Proceedings of Coding Theory and Applications 1988. Springer
    • Jacques Stern. A method for finding codewords of small weight. In Proceedings of Coding Theory and Applications 1988, volume 388 of LNCS, pages 106-113. Springer, 1989.
    • (1989) LNCS , vol.388 , pp. 106-113
    • Stern, J.1
  • 14
    • 19944425657 scopus 로고    scopus 로고
    • Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD
    • August Preprint
    • Xiaoyun Wang, Dengguo Feng, Xuejia Lai, and Xiuyuan Yu. Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, August 2004. Preprint, available at http://eprint.iacr.org/2004/199, presented at the Crypto 2004 rump session.
    • (2004) Crypto 2004 Rump Session
    • Wang, X.1    Feng, D.2    Lai, X.3    Xiuyuan, Yu.4
  • 15
    • 24944575304 scopus 로고    scopus 로고
    • Crypt-analysis for hash functions MD4 and RIPEMD
    • Proceedings of EUROCRYPT 2005. Springer
    • Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu. Crypt-analysis for Hash Functions MD4 and RIPEMD. In Proceedings of EUROCRYPT 2005, volume 3494 of LNCS, pages 1-18. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Xiuyuan, Yu.5
  • 16
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • Proceedings of CRYPTO 2005. Springer
    • Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding Collisions in the Full SHA-1. In Proceedings of CRYPTO 2005, volume 3621 of LNCS, pages 17-36. Springer,2005.
    • (2005) LNCS , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 17
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Proceedings of EUROCRYPT 2005. Springer
    • Xiaoyun Wang and Hongbo Yu. How to Break MD5 and Other Hash Functions. In Proceedings of EUROCRYPT 2005, volume 3494 of LNCS, pages 19-35. Springer, 2005.
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Hongbo, Yu.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.