SHA-1

From The ECRYPT Hash Function Website

Jump to: navigation, search

Contents

1 Specification

  • digest size: 160 bits
  • max. message length: < 264 bits
  • compression function: 512-bit message block, 160-bit chaining variable
  • Specification: FIPS 180-2 Secure Hash Standard

2 Cryptanalysis

2.1 Best Known Results

The best collision attack on full SHA-1 was published by Wang et al. It has complexity of 269 hash evaluations. The best collision example, a 70-step collision for SHA-1, was published by DeCanniere, Mendel and Rechberger.


2.2 Collision Attacks

Christophe De Canni\`ere, Florian Mendel, Christian Rechberger - Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
In Proceedings of Selected Areas in Cryptography, LNCS 4876, pp. 56-73, Springer, 2007
[Electronic Edition] [Bibtex]
Author : Christophe De Canni\`ere, Florian Mendel, Christian Rechberger
Title : Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
In : In Proceedings of Selected Areas in Cryptography -
[Abstract]

Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai - Algebraic Cryptanalysis of 58-Round SHA-1
In Proceedings of FSE, LNCS 4593, pp. 349-365, Springer, 2007
[Electronic Edition] [Bibtex]
Author : Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai
Title : Algebraic Cryptanalysis of 58-Round SHA-1
In : In Proceedings of FSE -
[Abstract]

Christophe De Canni\`ere, Christian Rechberger - Finding SHA-1 Characteristics: General Results and Applications
In Proceedings of ASIACRYPT, LNCS 4284, pp. 1-20, Springer, 2006
[Electronic Edition] [Bibtex]
Author : Christophe De Canni\`ere, Christian Rechberger
Title : Finding SHA-1 Characteristics: General Results and Applications
In : In Proceedings of ASIACRYPT -
[Abstract]

Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - Finding Collisions in the Full SHA-1
In Proceedings of CRYPTO, LNCS 3621, pp. 17-36, Springer, 2005
[Electronic Edition] [Bibtex]
Author : Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
Title : Finding Collisions in the Full SHA-1
In : In Proceedings of CRYPTO -

Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby - Collisions of SHA-0 and Reduced SHA-1
In Proceedings of EUROCRYPT, LNCS 3494, pp. 36-57, Springer, 2005
[Electronic Edition] [Bibtex]
Author : Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby
Title : Collisions of SHA-0 and Reduced SHA-1
In : In Proceedings of EUROCRYPT -
[Abstract]

Vincent Rijmen, Elisabeth Oswald - Update on SHA-1
In Proceedings of CT-RSA, LNCS 3376, pp. 58-71, Springer, 2005
[Electronic Edition] [Bibtex]
Author : Vincent Rijmen, Elisabeth Oswald
Title : Update on SHA-1
In : In Proceedings of CT-RSA -
[Abstract]

2.3 Preimage Attacks

Christophe De Canni\`ere, Christian Rechberger - Preimages for Reduced SHA-0 and SHA-1
In Proceedings of CRYPTO, LNCS 5157, pp. 179-202, Springer, 2008
[Electronic Edition] [Bibtex]
Author : Christophe De Canni\`ere, Christian Rechberger
Title : Preimages for Reduced SHA-0 and SHA-1
In : In Proceedings of CRYPTO -
[Abstract]

2.4 Others

Antoine Joux, Thomas Peyrin - Hash Functions and the (Amplified) Boomerang Attack
In Proceedings of CRYPTO, LNCS 4622, pp. 244--263, Springer, 2007
[Electronic Edition] [Bibtex]
Author : Antoine Joux, Thomas Peyrin
Title : Hash Functions and the (Amplified) Boomerang Attack
In : In Proceedings of CRYPTO -

Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen - The Impact of Carries on the Complexity of Collision Attacks on SHA-1
In Proceedings of FSE, LNCS 4047, pp. 278-292, Springer, 2006
[Electronic Edition] [Bibtex]
Author : Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
Title : The Impact of Carries on the Complexity of Collision Attacks on SHA-1
In : In Proceedings of FSE -
[Abstract]

Charanjit S. Jutla, Anindya C. Patthak - Provably Good Codes for Hash Function Design
In Proceedings of Selected Areas in Cryptography, LNCS 4356, pp. 376-393, Springer, 2006
[Electronic Edition] [Bibtex]
Author : Charanjit S. Jutla, Anindya C. Patthak
Title : Provably Good Codes for Hash Function Design
In : In Proceedings of Selected Areas in Cryptography -
[Abstract]

Norbert Pramstaller, Christian Rechberger, Vincent Rijmen - Impact of Rotations in SHA-1 and Related Hash Functions
In Proceedings of Selected Areas in Cryptography, LNCS 3897, pp. 261-275, Springer, 2005
[Electronic Edition] [Bibtex]
Author : Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
Title : Impact of Rotations in SHA-1 and Related Hash Functions
In : In Proceedings of Selected Areas in Cryptography -
[Abstract]

Akashi Satoh - Hardware Architecture and Cost Estimates for Breaking SHA-1
In Proceedings of ISC, LNCS 3650, pp. 259-273, Springer, 2005
[Electronic Edition] [Bibtex]
Author : Akashi Satoh
Title : Hardware Architecture and Cost Estimates for Breaking SHA-1
In : In Proceedings of ISC -
[Abstract]



Personal tools