Article

Article title DIFFERENTIAL CRYPTANALYSIS OF SHA-LIKE HASH FUNCTIONS
Authors L.K. Babenko, E.A. Ischukova
Section SECTION IV. METHODS AND MEANS OF CRYPTOGRAPHY AND STEGANOGRAPHY
Month, Year 11, 2010 @en
Index UDC 681.03.245
DOI
Abstract In article highlights of hash functions differential cryptanalysis on an example of algorithm SHA are considered. The technique of carrying out of the differential analysis of SHA hash function and also other hash functions having a similar structure is offered.

Download PDF

Keywords Hash function; differential cryptanalysis; difference; probability.
References 1. Основы: функции хэширования [Электронный ресурс], 03.06.2009. – http://www.cryptofaq.ru, свободный.
2. Xiaoyun Wang, Hongbo Yu., Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0 [Электронный ресурс]. – http://citeseerx.ist.psu.edu, свободный.
3. XiaoyunWang, Hongbo Yu., How to BreakMD5 and Other Hash Functions [Электронный ресурс]. – http://citeseerx.ist.psu.edu, свободный.
4. XiaoyunWang, Yiqun Lisa Yin, Hongbo Yu., Finding Collisions in the Full SHA-1 [Электронный ресурс]. – http://people.csail.mit.edu/yiqun/pub.htm, свободный.
5. Florent Chabaund, Antoine Joux, Differential Collisions of SHA-0 [Электронный ресурс]. – 19 June, 2000. – http://fchabaud.free.fr /English/Publications/, свободный.
6. Бабенко Л.К. Ищукова Е.А. Применение рекурсивного алгоритма поиска в Б-деревьях для дифференциального криптоанализа алгоритма шифрования ГОСТ 28147-89 // Материалы IХ Международной научно-практической конференции «Информационная безопасность». Часть 2. – Таганрог; Изд-во: ТТИ ЮФУ, 2007. – С. 92-97.
7. Babenko L., Ischukova E. Differential Analysis GOST Encryption Algorithm // Proceedings of the 3rd Internaternational Conference of Security of Information and Networks (SIN 2010), ACM, New York, 2010. – Р.149-157.

Comments are closed.