Paper 2014/945
Boomerang Attack on Step-Reduced SHA-512
Hongbo Yu and Dongxia Bai
Abstract
SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack. Boomerang distinguisher on SHA-512 compression function reduced to 48 steps is proposed, with a practical complexity of $2^{51}$. A practical example of the distinguisher for 48-step SHA-512 is also given. As far as we know, it is the best practical attack on step-reduced SHA-512.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Inscrypt 2014
- Keywords
- SHA-512hash functionsboomerang attack
- Contact author(s)
- yuhongbo @ mail tsinghua edu cn
- History
- 2014-11-19: received
- Short URL
- https://ia.cr/2014/945
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/945, author = {Hongbo Yu and Dongxia Bai}, title = {Boomerang Attack on Step-Reduced {SHA}-512}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/945}, year = {2014}, url = {https://eprint.iacr.org/2014/945} }