Cryptanalysis of Dynamic SHA(2) View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2009

AUTHORS

Jean-Philippe Aumasson , Orr Dunkelman , Sebastiaan Indesteege , Bart Preneel

ABSTRACT

In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5. Our analysis suggests that in the case of hash functions, where the attacker has more control over the rotations, this approach is less favorable than in block ciphers. We present practical, or close to practical, collision attacks on both Dynamic SHA and Dynamic SHA2. Moreover, we present a preimage attack on Dynamic SHA that is faster than exhaustive search. More... »

PAGES

415-432

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-05445-7_26

DOI

http://dx.doi.org/10.1007/978-3-642-05445-7_26

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1026977466


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "FHNW, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "\u00c9cole Normale Sup\u00e9rieure, INRIA, CNRS, Paris, France", 
          "id": "http://www.grid.ac/institutes/grid.4444.0", 
          "name": [
            "\u00c9cole Normale Sup\u00e9rieure, INRIA, CNRS, Paris, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dunkelman", 
        "givenName": "Orr", 
        "id": "sg:person.016523255235.34", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016523255235.34"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/COSIC, Katholieke Universiteit Leuven, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Indesteege", 
        "givenName": "Sebastiaan", 
        "id": "sg:person.013404144515.21", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404144515.21"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium", 
          "id": "http://www.grid.ac/institutes/grid.56912.39", 
          "name": [
            "Department of Electrical Engineering ESAT/COSIC, Katholieke Universiteit Leuven, Belgium", 
            "Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2009", 
    "datePublishedReg": "2009-01-01", 
    "description": "In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5. Our analysis suggests that in the case of hash functions, where the attacker has more control over the rotations, this approach is less favorable than in block ciphers. We present practical, or close to practical, collision attacks on both Dynamic SHA and Dynamic SHA2. Moreover, we present a preimage attack on Dynamic SHA that is faster than exhaustive search.", 
    "editor": [
      {
        "familyName": "Jacobson", 
        "givenName": "Michael J.", 
        "type": "Person"
      }, 
      {
        "familyName": "Rijmen", 
        "givenName": "Vincent", 
        "type": "Person"
      }, 
      {
        "familyName": "Safavi-Naini", 
        "givenName": "Reihaneh", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-05445-7_26", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-05443-3", 
        "978-3-642-05445-7"
      ], 
      "name": "Selected Areas in Cryptography", 
      "type": "Book"
    }, 
    "keywords": [
      "hash function", 
      "block cipher", 
      "data-dependent rotations", 
      "first round candidates", 
      "exhaustive search", 
      "SHA2", 
      "collision attack", 
      "preimage attack", 
      "cipher", 
      "attacks", 
      "more control", 
      "attacker", 
      "RC5", 
      "cryptanalysis", 
      "SHA", 
      "search", 
      "function", 
      "control", 
      "rotation", 
      "competition", 
      "analysis", 
      "candidates", 
      "dynamics", 
      "cases", 
      "paper", 
      "approach"
    ], 
    "name": "Cryptanalysis of Dynamic SHA(2)", 
    "pagination": "415-432", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1026977466"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-05445-7_26"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-05445-7_26", 
      "https://app.dimensions.ai/details/publication/pub.1026977466"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-06-01T22:33", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_376.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-05445-7_26"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-05445-7_26'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-05445-7_26'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-05445-7_26'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-05445-7_26'


 

This table displays all metadata directly associated to this object as RDF triples.

124 TRIPLES      23 PREDICATES      52 URIs      45 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-05445-7_26 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author Neb6318b575e84709a62483c351886058
4 schema:datePublished 2009
5 schema:datePublishedReg 2009-01-01
6 schema:description In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5. Our analysis suggests that in the case of hash functions, where the attacker has more control over the rotations, this approach is less favorable than in block ciphers. We present practical, or close to practical, collision attacks on both Dynamic SHA and Dynamic SHA2. Moreover, we present a preimage attack on Dynamic SHA that is faster than exhaustive search.
7 schema:editor N8098631bd7f947a7881ec5273b200ff4
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N6a07d72b546d4776be02950e017687ff
12 schema:keywords RC5
13 SHA
14 SHA2
15 analysis
16 approach
17 attacker
18 attacks
19 block cipher
20 candidates
21 cases
22 cipher
23 collision attack
24 competition
25 control
26 cryptanalysis
27 data-dependent rotations
28 dynamics
29 exhaustive search
30 first round candidates
31 function
32 hash function
33 more control
34 paper
35 preimage attack
36 rotation
37 search
38 schema:name Cryptanalysis of Dynamic SHA(2)
39 schema:pagination 415-432
40 schema:productId N2c1a848738404c55b53d8dfc26c99760
41 N6616273620ce4435b73f862cad01bf69
42 schema:publisher Nbd45bdf85c9045b8a83ab818e67db08b
43 schema:sameAs https://app.dimensions.ai/details/publication/pub.1026977466
44 https://doi.org/10.1007/978-3-642-05445-7_26
45 schema:sdDatePublished 2022-06-01T22:33
46 schema:sdLicense https://scigraph.springernature.com/explorer/license/
47 schema:sdPublisher N1efc422dd89941cc9dacf046bbece9b1
48 schema:url https://doi.org/10.1007/978-3-642-05445-7_26
49 sgo:license sg:explorer/license/
50 sgo:sdDataset chapters
51 rdf:type schema:Chapter
52 N1efc422dd89941cc9dacf046bbece9b1 schema:name Springer Nature - SN SciGraph project
53 rdf:type schema:Organization
54 N2c1a848738404c55b53d8dfc26c99760 schema:name doi
55 schema:value 10.1007/978-3-642-05445-7_26
56 rdf:type schema:PropertyValue
57 N6616273620ce4435b73f862cad01bf69 schema:name dimensions_id
58 schema:value pub.1026977466
59 rdf:type schema:PropertyValue
60 N67da5d38a58741bf97dda9443079a0d0 schema:familyName Safavi-Naini
61 schema:givenName Reihaneh
62 rdf:type schema:Person
63 N6a07d72b546d4776be02950e017687ff schema:isbn 978-3-642-05443-3
64 978-3-642-05445-7
65 schema:name Selected Areas in Cryptography
66 rdf:type schema:Book
67 N8098631bd7f947a7881ec5273b200ff4 rdf:first Ncf778deff6fc43b68509e79a5aa44e57
68 rdf:rest Nbc95be8cb683495ab89006f1edbf7551
69 N81791a7db5df4e99883850238f81b988 rdf:first N67da5d38a58741bf97dda9443079a0d0
70 rdf:rest rdf:nil
71 N85e0e379644b4cfc82f00372a92d1fc1 rdf:first sg:person.011115044357.39
72 rdf:rest rdf:nil
73 N90b2b9ca2b654be49bbc19ecae419036 rdf:first sg:person.013404144515.21
74 rdf:rest N85e0e379644b4cfc82f00372a92d1fc1
75 Nbc95be8cb683495ab89006f1edbf7551 rdf:first Ne1dff8d8aac2469081ea3bbd65c20b18
76 rdf:rest N81791a7db5df4e99883850238f81b988
77 Nbd45bdf85c9045b8a83ab818e67db08b schema:name Springer Nature
78 rdf:type schema:Organisation
79 Nc265890d5a064d18b4c37f34a61c77fd rdf:first sg:person.016523255235.34
80 rdf:rest N90b2b9ca2b654be49bbc19ecae419036
81 Ncf778deff6fc43b68509e79a5aa44e57 schema:familyName Jacobson
82 schema:givenName Michael J.
83 rdf:type schema:Person
84 Ne1dff8d8aac2469081ea3bbd65c20b18 schema:familyName Rijmen
85 schema:givenName Vincent
86 rdf:type schema:Person
87 Neb6318b575e84709a62483c351886058 rdf:first sg:person.012606440341.66
88 rdf:rest Nc265890d5a064d18b4c37f34a61c77fd
89 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
90 schema:name Information and Computing Sciences
91 rdf:type schema:DefinedTerm
92 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
93 schema:name Computation Theory and Mathematics
94 rdf:type schema:DefinedTerm
95 sg:person.011115044357.39 schema:affiliation grid-institutes:grid.56912.39
96 schema:familyName Preneel
97 schema:givenName Bart
98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
99 rdf:type schema:Person
100 sg:person.012606440341.66 schema:affiliation grid-institutes:grid.410380.e
101 schema:familyName Aumasson
102 schema:givenName Jean-Philippe
103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
104 rdf:type schema:Person
105 sg:person.013404144515.21 schema:affiliation grid-institutes:grid.56912.39
106 schema:familyName Indesteege
107 schema:givenName Sebastiaan
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404144515.21
109 rdf:type schema:Person
110 sg:person.016523255235.34 schema:affiliation grid-institutes:grid.4444.0
111 schema:familyName Dunkelman
112 schema:givenName Orr
113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016523255235.34
114 rdf:type schema:Person
115 grid-institutes:grid.410380.e schema:alternateName FHNW, Windisch, Switzerland
116 schema:name FHNW, Windisch, Switzerland
117 rdf:type schema:Organization
118 grid-institutes:grid.4444.0 schema:alternateName École Normale Supérieure, INRIA, CNRS, Paris, France
119 schema:name École Normale Supérieure, INRIA, CNRS, Paris, France
120 rdf:type schema:Organization
121 grid-institutes:grid.56912.39 schema:alternateName Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
122 schema:name Department of Electrical Engineering ESAT/COSIC, Katholieke Universiteit Leuven, Belgium
123 Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium
124 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...