메뉴 건너뛰기




Volumn 4284 LNCS, Issue , 2006, Pages 1-20

Finding SHA-1 characteristics: General results and applications

Author keywords

[No Author keywords available]

Indexed keywords

COLLISION ATTACK; COMPLEX CHARACTERISTICS; DEGREES OF FREEDOM; PROOF OF CONCEPT;

EID: 38049183978     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935230_1     Document Type: Conference Paper
Times cited : (169)

References (23)
  • 1
    • 35048892549 scopus 로고    scopus 로고
    • E. Biham and R. Chen. Near-Collisions of SHA-0. In M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, 3152 of LNCS, pages 290-305. Springer, 2004.
    • E. Biham and R. Chen. Near-Collisions of SHA-0. In M. K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, volume 3152 of LNCS, pages 290-305. Springer, 2004.
  • 2
    • 24944584156 scopus 로고    scopus 로고
    • E. Biham, R. Chen, A. Joux, P. Carribault, C. Lemuet, and W. Jalby. Collisions of SHA-0 and Reduced SHA-1. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, 3494 of LNCS, pages 36-57. Springer, 2005.
    • E. Biham, R. Chen, A. Joux, P. Carribault, C. Lemuet, and W. Jalby. Collisions of SHA-0 and Reduced SHA-1. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, volume 3494 of LNCS, pages 36-57. Springer, 2005.
  • 3
    • 33746706791 scopus 로고    scopus 로고
    • A Study of the MD5 Attacks: Insights and Improvements
    • M. Robshaw, editor, Proceedings of Fast Software Encryption, FSE, Graz, Austria, March 15-17, of, To appear. 2006
    • J. Black, M. Cochran, and T. Highland. A Study of the MD5 Attacks: Insights and Improvements. In M. Robshaw, editor, Proceedings of Fast Software Encryption - FSE 2006, Graz, Austria, March 15-17, 2006, volume 4047 of LNCS, 2006. To appear.
    • (2006) LNCS , vol.4047
    • Black, J.1    Cochran, M.2    Highland, T.3
  • 4
    • 84957643546 scopus 로고    scopus 로고
    • F. Chabaud and A. Joux. Differential Collisions in SHA-0. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, 1462 of LNCS, pages 56-71. Springer, 1998.
    • F. Chabaud and A. Joux. Differential Collisions in SHA-0. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, volume 1462 of LNCS, pages 56-71. Springer, 1998.
  • 5
    • 77649241429 scopus 로고    scopus 로고
    • Provably Good Codes for Hash Function Design
    • R. Cramer, editor, Proceedings of SAC 2006, Springer, to appear
    • C. S. Jutla and A. C. Patthak. Provably Good Codes for Hash Function Design. In R. Cramer, editor, Proceedings of SAC 2006, LNCS. Springer, 2006. to appear.
    • (2006) LNCS
    • Jutla, C.S.1    Patthak, A.C.2
  • 6
    • 33746056045 scopus 로고    scopus 로고
    • J. Kelsey and T. Kohno. Herding Hash Functions and the Nostradamus Attack. In S. Vaudenay, editor, Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, 4004 of LNCS, pages 183-200. Springer, 2005.
    • J. Kelsey and T. Kohno. Herding Hash Functions and the Nostradamus Attack. In S. Vaudenay, editor, Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, volume 4004 of LNCS, pages 183-200. Springer, 2005.
  • 7
    • 34548114558 scopus 로고    scopus 로고
    • Tunnels in Hash Functions:MD5 Collisions Within a Minute. Cryptology ePrint Archive
    • Report 2006/105
    • V. Klima. Tunnels in Hash Functions:MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105, 2006. http://eprint.iacr.org/.
    • (2006)
    • Klima, V.1
  • 8
    • 33846418620 scopus 로고    scopus 로고
    • Improved Collision Attack on Hash Function MD5. Cryptology ePrint Archive
    • Report 2005/425
    • J. Liang and X. Lai. Improved Collision Attack on Hash Function MD5. Cryptology ePrint Archive, Report 2005/425, 2005. http://eprint.iacr.org/.
    • (2005)
    • Liang, J.1    Lai, X.2
  • 9
    • 79960038232 scopus 로고    scopus 로고
    • Improved Collision Attack on MD4. Cryptology ePrint Archive
    • Report 2005/151
    • Y. Naito, Y. Sasaki, N. Kunihiro, and K. Ohta. Improved Collision Attack on MD4. Cryptology ePrint Archive, Report 2005/151, 2005. http://eprint.iacr. org/.
    • (2005)
    • Naito, Y.1    Sasaki, Y.2    Kunihiro, N.3    Ohta, K.4
  • 10
    • 77649247915 scopus 로고    scopus 로고
    • Message Modification for Step 21-23 on SHA-0. Cryptology ePrint Archive
    • Report 2006/016
    • Y. Naito, Y. Sasaki, T. Shimoyama, J. Yajima, N. Kunihiro, and K. Ohta. Message Modification for Step 21-23 on SHA-0. Cryptology ePrint Archive, Report 2006/016, 2006. http://eprint.iacr.org/.
    • (2006)
    • Naito, Y.1    Sasaki, Y.2    Shimoyama, T.3    Yajima, J.4    Kunihiro, N.5    Ohta, K.6
  • 11
    • 4043135942 scopus 로고    scopus 로고
    • August, Available online at
    • National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard, August 2002. Available online at http://www.itl.nist.gov/ fipspubs/.
    • (2002) FIPS-180-2: Secure Hash Standard
  • 12
    • 33646824396 scopus 로고    scopus 로고
    • N. Pramstaller, C. Rechberger, and V. Rijmen. Exploiting Coding Theory for Collision Attacks on SHA-1. In N. P. Smart, editor, Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, 3796 of LNCS, pages 78-95. Springer, 2005.
    • N. Pramstaller, C. Rechberger, and V. Rijmen. Exploiting Coding Theory for Collision Attacks on SHA-1. In N. P. Smart, editor, Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, volume 3796 of LNCS, pages 78-95. Springer, 2005.
  • 13
    • 24144478826 scopus 로고    scopus 로고
    • V. Rijmen and E. Oswald. Update on SHA-1. In A. Menezes, editor, Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, 3376 of LNCS, pages 58-71. Springer, 2005.
    • V. Rijmen and E. Oswald. Update on SHA-1. In A. Menezes, editor, Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, volume 3376 of LNCS, pages 58-71. Springer, 2005.
  • 14
    • 33746723520 scopus 로고    scopus 로고
    • Searching for Differential Paths in MD4
    • M. Robshaw, editor, Proceedings of Fast Software Encryption, FSE, Graz, Austria, March 15-17, of, To appear. 2006
    • M. Schläffer and E. Oswald. Searching for Differential Paths in MD4. In M. Robshaw, editor, Proceedings of Fast Software Encryption - FSE 2006, Graz, Austria, March 15-17, 2006, volume 4047 of LNCS, 2006. To appear.
    • (2006) LNCS , vol.4047
    • Schläffer, M.1    Oswald, E.2
  • 15
    • 38149060942 scopus 로고    scopus 로고
    • Fast Collision Attack on MD5. Cryptology ePrint Archive
    • Report 2006/104
    • M. Stevens. Fast Collision Attack on MD5. Cryptology ePrint Archive, Report 2006/104, 2006. http://eprint.iacr.org/.
    • (2006)
    • Stevens, M.1
  • 16
    • 54249084869 scopus 로고    scopus 로고
    • Gröbner Basis Based Cryptanalysis of SHA-1. Cryptology ePrint Archive
    • Report 2006/098
    • M. Sugita, M. Kawazoe, and H. Imai. Gröbner Basis Based Cryptanalysis of SHA-1. Cryptology ePrint Archive, Report 2006/098, 2006. http://eprint.iacr.org/.
    • (2006)
    • Sugita, M.1    Kawazoe, M.2    Imai, H.3
  • 17
    • 24944575304 scopus 로고    scopus 로고
    • X.Wang, X. Lai, D. Feng, H. Chen, and X. Yu. Cryptanalysis of the Hash Functions MD4 and RIPEMD. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, 3494 of LNCS, pages 1-18. Springer, 2005.
    • X.Wang, X. Lai, D. Feng, H. Chen, and X. Yu. Cryptanalysis of the Hash Functions MD4 and RIPEMD. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, volume 3494 of LNCS, pages 1-18. Springer, 2005.
  • 19
    • 77649258620 scopus 로고    scopus 로고
    • New Collision Search for SHA-1, August 2005. Presented at rump
    • session of CRYPTO
    • X. Wang, A. Yao, and F. Yao. New Collision Search for SHA-1, August 2005. Presented at rump session of CRYPTO 2005.
    • (2005)
    • Wang, X.1    Yao, A.2    Yao, F.3
  • 20
    • 33745171465 scopus 로고    scopus 로고
    • X. Wang, Y. L. Yin, and H. Yu. Finding Collisions in the Full SHA-1. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005, 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, 3621 of LNCS, pages 17-36. Springer, 2005.
    • X. Wang, Y. L. Yin, and H. Yu. Finding Collisions in the Full SHA-1. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005, 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, volume 3621 of LNCS, pages 17-36. Springer, 2005.
  • 21
    • 24944591357 scopus 로고    scopus 로고
    • X. Wang and H. Yu. How to Break MD5 and Other Hash Functions. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, 3494 of LNCS, pages 19-35. Springer, 2005.
    • X. Wang and H. Yu. How to Break MD5 and Other Hash Functions. In R. Cramer, editor, Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings, volume 3494 of LNCS, pages 19-35. Springer, 2005.
  • 22
    • 33745122987 scopus 로고    scopus 로고
    • X. Wang, H. Yu, and Y. L. Yin. Efficient Collision Search Attacks on SHA-0. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005, 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, 3621 of LNCS, pages 1-16. Springer, 2005.
    • X. Wang, H. Yu, and Y. L. Yin. Efficient Collision Search Attacks on SHA-0. In V. Shoup, editor, Advances in Cryptology - CRYPTO 2005, 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, volume 3621 of LNCS, pages 1-16. Springer, 2005.
  • 23
    • 77649253191 scopus 로고    scopus 로고
    • Personal Communication, March
    • Y. L. Yin. Personal Communication, March 2006.
    • (2006)
    • Yin, Y.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.