Paper 2009/259
Differential Path for SHA-1 with complexity
Cameron McDonald, Philip Hawkes, and Josef Pieprzyk
Abstract
Although SHA-1 has been theoretically broken for some time now, the task
of finding a practical collision is yet to be completed. Using some new approaches to differential analysis, we were able to find a new differential path which can be used in a collision attack with complexity of
Note: The attack complexity reported in this paper was based on two results:
1. The nonlinear differential path in Round 1 uses 5 auxiliary
differentials in a Boomerang attack.
2. The linear differential path for Rounds 2-4 has a cost evaluation
of
Metadata
- Available format(s)
- -- withdrawn --
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Hash FunctionsDifferential PathBoomerang AttackSHA-1
- Contact author(s)
- cmcdonal @ ics mq edu au
- History
- 2009-08-10: withdrawn
- 2009-06-03: received
- See all versions
- Short URL
- https://ia.cr/2009/259
- License
-
CC BY