Paper 2016/374
Analysis of SHA-512/224 and SHA-512/256
Abstract
In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 on 64-bit platforms, while maintaining the same hash size and claimed security level. So far, no third-party analysis of SHA-512/224 or SHA-512/256 has been published. In this work, we examine the collision resistance of step-reduced versions of SHA-512/224 and SHA-512/256 by using differential cryptanalysis in combination with sophisticated search tools. We are able to generate practical examples of free-start collisions for 44-step SHA-512/224 and 43-step SHA-512/256. Thus, the truncation performed by these variants on their larger state allows us to attack several more rounds compared to the untruncated family members. In addition, we improve upon the best published collisions for 24-step SHA-512 and present practical collisions for 27 steps of SHA-512/224, SHA-512/256, and SHA-512.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- A major revision of an IACR publication in ASIACRYPT 2015
- DOI
- 10.1007/978-3-662-48800-3_25
- Keywords
- hash functionscryptanalysiscollisionsfree-start collisionsSHA-512224SHA-512256SHA-512SHA-2
- Contact author(s)
- maria eichlseder @ iaik tugraz at
- History
- 2024-06-07: revised
- 2016-04-14: received
- See all versions
- Short URL
- https://ia.cr/2016/374
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/374, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Analysis of {SHA}-512/224 and {SHA}-512/256}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/374}, year = {2016}, doi = {10.1007/978-3-662-48800-3_25}, url = {https://eprint.iacr.org/2016/374} }