L2.3 New attacks and connections with previously known attacks
Therefore, we briefly explain a few new attacks, that have been released after the beginning of the project, in order to update our state of the art. We also explain some generic tools that are used in other sections.
Part of the results that were discovered by Saphir partners are attacks against the SHA-1hash hunction. They reuse an automatic differential path search tool that was created by C. De Cannière and C. Rechberger in . This algorithm has been improved by A. Joux and T. Peyrin, who combined it with a variant of the boomerang attack against hash functions. This result was published at the Crypto’07 conference . Some results have also been achieved against the MD family. P.-A. Fouque, G. Leurent and P. Nguyen have created an algorithm to automatically generate MD4 differential paths . G.Leurent has also adapted Klima’s tunnel attack  to find collisions for MD4 and MD5 with some parts of the messages chosen by the attacker .
We also display some new attacks against other hash functions. These cryptanalyses are theoric collision attacks against FORK-256  and GRINDAHL .
 C. De Cannière and C. Rechberger. Finding SHA-1 Characteristics : General Results and Applications. In X. Lai and K. Chen, editors, Advances in Cryptology – ASIACRYPT 2006, volume 4284 of Lecture Notes in Computer Science, pages 1–20. Springer-Verlag, 2006.
 A. Joux and T. Peyrin. Hash Functions and the (Amplified) Boomerang Attack. In A. Menezes, editor, CRYPTO’07, volume 4622 of Lecture Notes in Computer Science, pages 244–263. Springer-Verlag, 2007.
 P.-A. Fouque, G. Leurent, and P. Nguyen. Automatic Search of Differential Path in MD4. ECRYPT Hash Workshop.
 V. Klima. Tunnels in Hash Functions : MD5 Collisions Within a Minute. Technical report, Cryptology ePrint Archive.
 G. Leurent. Message Freedom in MD4 and MD5 Collisions : Application to APOP. In A. Biryukov, editor, FSE’07, volume 4593 of Lecture Notes in Computer Science, pages 309–328. Springer-Verlag, 2007.
 O. Billet, S. Contini, K. Matusiewicz, T. Peyrin, and J. Pieprzyk. Cryptanalysis of FORK-256. In A. Biryukov, editor, Fast Software Encryption 2007, volume 4593 of Lecture Notes in Computer Science. Springer-Verlag, 2007.
 T. Peyrin. Cryptanalysis of Grindahl. In Advances in Cryptology – ASIACRYPT 2007, 2007.
Proposé le : Tue, 11-Mar-2008
Téléchargé(s) : 1237
Taille du Fichier (en Octets): 1.19 MB
Note : (0 votes)
Révisions : (0)
Miroirs disponibles: 0
Temps de téléchargements :
Modem(56k) : 3.3min
ISDN(64k) : 2.9min
DSL(768k) : 14s
LAN(10M) : 1s