Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family

Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    We present a new concept of biclique as a tool for preimage attacks, which employs many powerful techniques from differential cryptanalysis of block ciphers and hash functions. The new tool has proved to be widely applicable by inspiring many authors to publish new results of the full versions of AES, KASUMI, IDEA, and Square. In this paper, we show how our concept leads to the first cryptanalysis of the round-reduced Skein hash function, and describe an attack on the SHA-2 hash function with more rounds than before.
    Original languageEnglish
    Title of host publicationFast Software Encryption : 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers
    PublisherSpringer
    Publication date2012
    Pages244-263
    ISBN (Print)978-3-642-34046-8
    ISBN (Electronic)978-3-642-34047-5
    DOIs
    Publication statusPublished - 2012
    Event19th International Workshop on Fast Software Encryption (FSE 2012) - Washington, United States
    Duration: 19 Mar 201221 Mar 2012
    Conference number: 19

    Workshop

    Workshop19th International Workshop on Fast Software Encryption (FSE 2012)
    Number19
    CountryUnited States
    CityWashington
    Period19/03/201221/03/2012
    SeriesLecture Notes in Computer Science
    Volume7549
    ISSN0302-9743

    Fingerprint Dive into the research topics of 'Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family'. Together they form a unique fingerprint.

    Cite this