Login
Main Menu
Who's Online
1 utilisateur(s) en ligne (dont 1 sur SAPHIR-Downloads)

Membre(s): 0
Invité(s): 1

plus...
WFDownloads is developed by The SmartFactory (http://www.smartfactory.ca), a division of InBox Solutions (http://www.inboxsolutions.net)
SAPHIR-Downloads > Projet RNRT SAPHIR-Livrables > L2.3 New attacks and connections with previously known attacks

SAPHIR-Downloads

L2.3 New attacks and connections with previously known attacks



Description : 

Therefore, we briefly explain a few new attacks, that have been released after the beginning of the project, in order to update our state of the art. We also explain some generic tools that are used in other sections.

Part of the results that were discovered by Saphir partners are attacks against the SHA-1hash hunction. They reuse an automatic differential path search tool that was created by C. De Cannière and C. Rechberger in [1]. This algorithm has been improved by A. Joux and T. Peyrin, who combined it with a variant of the boomerang attack against hash functions. This result was published at the Crypto’07 conference [2]. Some results have also been achieved against the MD family. P.-A. Fouque, G. Leurent and P. Nguyen have created an algorithm to automatically generate MD4 differential paths [3]. G.Leurent has also adapted Klima’s tunnel attack [4] to find collisions for MD4 and MD5 with some parts of the messages chosen by the attacker [5].

We also display some new attacks against other hash functions. These cryptanalyses are theoric collision attacks against FORK-256 [6] and GRINDAHL [7].

[1] C. De Cannière and C. Rechberger. Finding SHA-1 Characteristics : General Results and Applications. In X. Lai and K. Chen, editors, Advances in Cryptology – ASIACRYPT 2006, volume 4284 of Lecture Notes in Computer Science, pages 1–20. Springer-Verlag, 2006.

[2] A. Joux and T. Peyrin. Hash Functions and the (Amplified) Boomerang Attack. In A. Menezes, editor, CRYPTO’07, volume 4622 of Lecture Notes in Computer Science, pages 244–263. Springer-Verlag, 2007.

[3] P.-A. Fouque, G. Leurent, and P. Nguyen. Automatic Search of Differential Path in MD4. ECRYPT Hash Workshop.

[4] V. Klima. Tunnels in Hash Functions : MD5 Collisions Within a Minute. Technical report, Cryptology ePrint Archive.

[5] G. Leurent. Message Freedom in MD4 and MD5 Collisions : Application to APOP. In A. Biryukov, editor, FSE’07, volume 4593 of Lecture Notes in Computer Science, pages 309–328. Springer-Verlag, 2007.

[6] O. Billet, S. Contini, K. Matusiewicz, T. Peyrin, and J. Pieprzyk. Cryptanalysis of FORK-256. In A. Biryukov, editor, Fast Software Encryption 2007, volume 4593 of Lecture Notes in Computer Science. Springer-Verlag, 2007.

[7] T. Peyrin. Cryptanalysis of Grindahl. In Advances in Cryptology – ASIACRYPT 2007, 2007.

Proposé par: admin
Editeur: DCSSI
Proposé le : Tue, 11-Mar-2008

Version: 1.0
Téléchargé(s) : 1237
Taille du Fichier (en Octets): 1.19 MB

Note :   (0 votes)

Révisions :  (0)

Miroirs disponibles: 0

Temps de téléchargements :
Modem(56k) : 3.3min
ISDN(64k) : 2.9min
DSL(768k) : 14s
LAN(10M) : 1s
 
Prix: Libre | Plateformes Supportées: None | License: None | Restrictions: None

Projet RNRT SAPHIR Révisions d'utilisateur

Autres fichiers de : admin

L2.3 New attacks and connections with previously known attacks © copyright 2017 http://www.crypto-hash.fr

 
Les commentaires appartiennent à leurs auteurs. Nous ne sommes pas responsables de leur contenu.
Search
Fichiers récents