Abstract
In this paper, we present preimage attacks on up to 43-step SHA-256 (around 67% of the total 64 steps) and 46-step SHA-512 (around 57.5% of the total 80 steps), which significantly increases the number of attacked steps compared to the best previously published preimage attack working for 24 steps. The time complexities are 2^251.9, 2^509 for finding pseudo-preimages and 2^254.9, 2^511.5 compression function operations for full preimages. The memory requirements are modest, around 2^6 words for 43-step SHA-256 and 46-step SHA-512. The pseudo-preimage attack also applies to 43-step SHA-224 and SHA-384. Our attack is a meet-in-the-middle attack that uses a range of novel techniques to split the function into two independent parts that can be computed separately and then matched in a birthday-style phase.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology -- ASIACRYPT 2009 |
Editors | Mitsuru Matsui |
Number of pages | 722 |
Volume | 5912 |
Publisher | Springer |
Publication date | 2009 |
Pages | 578-597 |
ISBN (Print) | 978-3-642-10365-0 |
DOIs | |
Publication status | Published - 2009 |
Event | 15th Annual International Conference on the Theory and Application of Cryptology and Information Security - Tokyo, Japan Duration: 6 Dec 2009 → 10 Dec 2009 Conference number: 15 http://asiacrypt2009.cipher.risk.tsukuba.ac.jp/ |
Conference
Conference | 15th Annual International Conference on the Theory and Application of Cryptology and Information Security |
---|---|
Number | 15 |
Country/Territory | Japan |
City | Tokyo |
Period | 06/12/2009 → 10/12/2009 |
Internet address |
Series | Lecture Notes in Computer Science |
---|---|
Number | 5912 |
ISSN | 0302-9743 |