You are looking at a specific version 20110121:040754 of this paper.
See the latest version.
Paper 2011/037
Higher-Order Differential Attack on Reduced SHA-256
Mario Lamberger and Florian Mendel
Abstract
In this work, we study the application of higher-order differential attacks on hash functions. We show a second-order differential attack on the SHA-256 compression function reduced to 46 out of 64 steps. We implemented the attack and give the result in Table 1. The best attack so far (in a different attack model) with practical complexity was for 33 steps of the compression function.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- hash functionshigher-order differentialsnon-randomnessboomerang attackSHA-256
- Contact author(s)
- florian mendel @ iaik tugraz at
- History
- 2011-01-21: received
- Short URL
- https://ia.cr/2011/037
- License
-
CC BY