Paper 2009/479
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512
Yu Sasaki, Lei Wang, and Kazumaro Aoki
Abstract
In this paper, we propose preimage attacks on 41-step SHA-256 and 46-step SHA-512,
which drastically increase the number of attacked steps compared to the best previous preimage attack working for only 24 steps.
The time complexity for 41-step SHA-256 is
Note: This paper was originally submitted to Asiacrypt2009. The authors were told to merged the paper with another one. The merged version will appear in the ASIACRYPT2009. This version is exactly the same as the original submittion except for added author's names and affiliations. Reviewer's comments are reflected in the merged version.
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. A merged version will appear in the ASIACRYPT2009.
- Keywords
- SHA-256SHA-512hashpreimage attackmeet-in-the-middle
- Contact author(s)
- sasaki yu @ lab ntt co jp
- History
- 2009-09-29: received
- Short URL
- https://ia.cr/2009/479
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2009/479, author = {Yu Sasaki and Lei Wang and Kazumaro Aoki}, title = {Preimage Attacks on 41-Step {SHA}-256 and 46-Step {SHA}-512}, howpublished = {Cryptology {ePrint} Archive, Paper 2009/479}, year = {2009}, url = {https://eprint.iacr.org/2009/479} }