Cryptology ePrint Archive: Report 2011/037
Higher-Order Differential Attack on Reduced SHA-256
Mario Lamberger and Florian Mendel
Abstract: In this work, we study the application of higher-order differential attacks on hash functions. We show a second-order differential attack on the SHA-256 compression function reduced to 46 out of 64 steps. We implemented the attack and give the result in Table 1.
The best attack so far (in a different attack model) with practical complexity was for 33 steps of the compression function.
Category / Keywords: hash functions, higher-order differentials, non-randomness, boomerang attack, SHA-256
Date: received 20 Jan 2011
Contact author: florian mendel at iaik tugraz at
Available format(s): PDF | BibTeX Citation
Version: 20110121:040754 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]