Cryptanalysis of Dynamic SHA(2) View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2009

AUTHORS

Jean-Philippe Aumasson , Orr Dunkelman , Sebastiaan Indesteege , Bart Preneel

ABSTRACT

In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5. Our analysis suggests that in the case of hash functions, where the attacker has more control over the rotations, this approach is less favorable than in block ciphers. We present practical, or close to practical, collision attacks on both Dynamic SHA and Dynamic SHA2. Moreover, we present a preimage attack on Dynamic SHA that is faster than exhaustive search. More... »

PAGES

415-432

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-05445-7_26

DOI

http://dx.doi.org/10.1007/978-3-642-05445-7_26

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1026977466


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "\u00c9cole Normale Sup\u00e9rieure, INRIA, CNRS, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.4444.0", 
          "name": [
            "\u00c9cole Normale Sup\u00e9rieure, INRIA, CNRS, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dunkelman", 
        "givenName": "Orr", 
        "id": "sg:person.016523255235.34", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016523255235.34"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/COSIC, Katholieke Universiteit Leuven, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Indesteege", 
        "givenName": "Sebastiaan", 
        "id": "sg:person.013404144515.21", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404144515.21"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/COSIC, Katholieke Universiteit Leuven, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2009", 
    "datePublishedReg": "2009-01-01", 
    "description": "In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5. Our analysis suggests that in the case of hash functions, where the attacker has more control over the rotations, this approach is less favorable than in block ciphers. We present practical, or close to practical, collision attacks on both Dynamic SHA and Dynamic SHA2. Moreover, we present a preimage attack on Dynamic SHA that is faster than exhaustive search.", 
    "editor": [
      {
        "familyName": "Jacobson", 
        "givenName": "Michael J.", 
        "type": "Person"
      }, 
      {
        "familyName": "Rijmen", 
        "givenName": "Vincent", 
        "type": "Person"
      }, 
      {
        "familyName": "Safavi-Naini", 
        "givenName": "Reihaneh", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-05445-7_26", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-05443-3", 
        "978-3-642-05445-7"
      ], 
      "name": "Selected Areas in Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "hash function", 
      "block cipher", 
      "certain block ciphers", 
      "data-dependent rotations", 
      "first round candidates", 
      "exhaustive search", 
      "SHA2", 
      "collision attack", 
      "preimage attack", 
      "cipher", 
      "attacks", 
      "more control", 
      "attacker", 
      "RC5", 
      "SHA", 
      "cryptanalysis", 
      "search", 
      "function", 
      "control", 
      "rotation", 
      "competition", 
      "analysis", 
      "candidates", 
      "dynamics", 
      "cases", 
      "paper", 
      "approach"
    ], 
    "name": "Cryptanalysis of Dynamic SHA(2)", 
    "pagination": "415-432", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1026977466"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-05445-7_26"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-05445-7_26", 
      "https://app.dimensions.ai/details/publication/pub.1026977466"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-08-04T17:21", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220804/entities/gbq_results/chapter/chapter_439.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-05445-7_26"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-05445-7_26'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-05445-7_26'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-05445-7_26'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-05445-7_26'


 

This table displays all metadata directly associated to this object as RDF triples.

124 TRIPLES      22 PREDICATES      52 URIs      45 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-05445-7_26 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author Na5ede81513894d3292f8b551ce191fe7
4 schema:datePublished 2009
5 schema:datePublishedReg 2009-01-01
6 schema:description In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5. Our analysis suggests that in the case of hash functions, where the attacker has more control over the rotations, this approach is less favorable than in block ciphers. We present practical, or close to practical, collision attacks on both Dynamic SHA and Dynamic SHA2. Moreover, we present a preimage attack on Dynamic SHA that is faster than exhaustive search.
7 schema:editor N37f3cfe279f24bbe8c492c31ef648aeb
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N42e0658abb934cf394d6a73bedc1ab6d
11 schema:keywords RC5
12 SHA
13 SHA2
14 analysis
15 approach
16 attacker
17 attacks
18 block cipher
19 candidates
20 cases
21 certain block ciphers
22 cipher
23 collision attack
24 competition
25 control
26 cryptanalysis
27 data-dependent rotations
28 dynamics
29 exhaustive search
30 first round candidates
31 function
32 hash function
33 more control
34 paper
35 preimage attack
36 rotation
37 search
38 schema:name Cryptanalysis of Dynamic SHA(2)
39 schema:pagination 415-432
40 schema:productId N4fcefd97a12346b88a1f4d8b0dde13a2
41 N685146420aa944ab9e91300eaa8854d6
42 schema:publisher N7b30ce810aed4dd98f1f82a19c2ca549
43 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026977466
44 https://doi.org/10.1007/978-3-642-05445-7_26
45 schema:sdDatePublished 2022-08-04T17:21
46 schema:sdLicense https://scigraph.springernature.com/explorer/license/
47 schema:sdPublisher Nc7c0bf22c4024ee7b863362d409ff833
48 schema:url https://doi.org/10.1007/978-3-642-05445-7_26
49 sgo:license sg:explorer/license/
50 sgo:sdDataset chapters
51 rdf:type schema:Chapter
52 N09302f7b02984be5aa9d04cc70792594 schema:familyName Safavi-Naini
53 schema:givenName Reihaneh
54 rdf:type schema:Person
55 N1db4996e623e4c8f8e19554d25e52729 rdf:first sg:person.016523255235.34
56 rdf:rest N4804d17e6c9845d8a548241b95a0cc3d
57 N255c16b561494a2db1383e24e3a307d6 rdf:first N09302f7b02984be5aa9d04cc70792594
58 rdf:rest rdf:nil
59 N37f3cfe279f24bbe8c492c31ef648aeb rdf:first Nf600b233cb90472085cf79a693e982f4
60 rdf:rest N61a206e2bb95415483e0dcd1f868041d
61 N42e0658abb934cf394d6a73bedc1ab6d schema:isbn 978-3-642-05443-3
62 978-3-642-05445-7
63 schema:name Selected Areas in Cryptography
64 rdf:type schema:Book
65 N4804d17e6c9845d8a548241b95a0cc3d rdf:first sg:person.013404144515.21
66 rdf:rest Nafa1b25a4c36404d8e6a4f45440aed42
67 N4fcefd97a12346b88a1f4d8b0dde13a2 schema:name doi
68 schema:value 10.1007/978-3-642-05445-7_26
69 rdf:type schema:PropertyValue
70 N56921d4f26ff4a5d92f5c91a44a26ccb schema:familyName Rijmen
71 schema:givenName Vincent
72 rdf:type schema:Person
73 N61a206e2bb95415483e0dcd1f868041d rdf:first N56921d4f26ff4a5d92f5c91a44a26ccb
74 rdf:rest N255c16b561494a2db1383e24e3a307d6
75 N685146420aa944ab9e91300eaa8854d6 schema:name dimensions_id
76 schema:value pub.1026977466
77 rdf:type schema:PropertyValue
78 N7b30ce810aed4dd98f1f82a19c2ca549 schema:name Springer Nature
79 rdf:type schema:Organisation
80 Na5ede81513894d3292f8b551ce191fe7 rdf:first sg:person.012606440341.66
81 rdf:rest N1db4996e623e4c8f8e19554d25e52729
82 Nafa1b25a4c36404d8e6a4f45440aed42 rdf:first sg:person.011115044357.39
83 rdf:rest rdf:nil
84 Nc7c0bf22c4024ee7b863362d409ff833 schema:name Springer Nature - SN SciGraph project
85 rdf:type schema:Organization
86 Nf600b233cb90472085cf79a693e982f4 schema:familyName Jacobson
87 schema:givenName Michael J.
88 rdf:type schema:Person
89 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
90 schema:name Information and Computing Sciences
91 rdf:type schema:DefinedTerm
92 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
93 schema:name Computation Theory and Mathematics
94 rdf:type schema:DefinedTerm
95 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.56912.39
96 schema:familyName Preneel
97 schema:givenName Bart
98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
99 rdf:type schema:Person
100 sg:person.012606440341.66 schema:affiliation grid-institutes:grid.410380.e
101 schema:familyName Aumasson
102 schema:givenName Jean-Philippe
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
104 rdf:type schema:Person
105 sg:person.013404144515.21 schema:affiliation grid-institutes:grid.56912.39
106 schema:familyName Indesteege
107 schema:givenName Sebastiaan
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404144515.21
109 rdf:type schema:Person
110 sg:person.016523255235.34 schema:affiliation grid-institutes:grid.4444.0
111 schema:familyName Dunkelman
112 schema:givenName Orr
113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016523255235.34
114 rdf:type schema:Person
115 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
116 schema:name FHNW, Windisch, Switzerland
117 rdf:type schema:Organization
118 grid-institutes:grid.4444.0 schema:alternateName École Normale Supérieure, INRIA, CNRS, Paris, France
119 schema:name École Normale Supérieure, INRIA, CNRS, Paris, France
120 rdf:type schema:Organization
121 grid-institutes:grid.56912.39 schema:alternateName Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
122 schema:name Department of Electrical Engineering ESAT/COSIC, Katholieke Universiteit Leuven, Belgium
123 Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
124 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...