Logo des Repositoriums
 

Analysis of simplified variants of SHA-256*

dc.contributor.authorMatusiewicz, Krystian
dc.contributor.authorPieprzyk, Josef
dc.contributor.authorPramstaller, Norbert
dc.contributor.authorRechberger, Christian
dc.contributor.authorRijmen, Vincent
dc.contributor.editorWulf, Christopher
dc.contributor.editorLucks, Stefan
dc.contributor.editorYau, Po-Wah
dc.date.accessioned2019-08-26T12:42:16Z
dc.date.available2019-08-26T12:42:16Z
dc.date.issued2005
dc.description.abstractIn this paper we analyse the role of some of the building blocks of SHA-256. We show that the disturbance-correction strategy is applicable to the SHA-256 architecture and we prove that functions Σ, σ are vital for the security of SHA-256 by showing that for a variant without them it is possible to find collisions with complexity 264 hash operations. As a step towards an analysis of the full function, we present the results of our experiments on Hamming weights of expanded messages for different variants of the message expansion and show that there exist low-weight expanded messages for XOR-linearised variants.en
dc.identifier.isbn3-88579-403-9
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/24844
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofWEWoRC 2005 – Western European Workshop on Research in Cryptology
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-74
dc.titleAnalysis of simplified variants of SHA-256*en
dc.typeText/Conference Paper
gi.citation.endPage134
gi.citation.publisherPlaceBonn
gi.citation.startPage123
gi.conference.date5.-7. July 2005
gi.conference.locationLeuven, Belgium
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
GI-Edition74.-12.pdf
Größe:
251.9 KB
Format:
Adobe Portable Document Format