SHA-256/224

From The ECRYPT Hash Function Website

Jump to: navigation, search

Contents

1 Specification

2 Cryptanalysis

2.1 Best Known Results

Collision attacks up to 24 out of 64 steps. Other non random behavior up to 31 steps. Both results are due to Indesteege et al (SAC 2008). Preimages on up to 24 steps due to Isobe and Shibutani (FSE 2009).


2.2 Generic Attacks


2.3 Collision Attacks

Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger - Collisions and other Non-Random Properties for Step-Reduced SHA-256
In Proceedings of Selected Areas in Cryptography -- SAC 2008, LNCS 5381, pp. 276-293, Springer, 2008
[Electronic Edition] [Bibtex]
Author : Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Christian Rechberger
Title : Collisions and other Non-Random Properties for Step-Reduced SHA-256
In : In Proceedings of Selected Areas in Cryptography -- SAC 2008 -
[Abstract]

Somitra Kumar Sanadhya, Palash Sarkar - Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
In Proceedings of ISC, LNCS 5222, pp. 244-259, Springer, 2008
[Electronic Edition] [Bibtex]
Author : Somitra Kumar Sanadhya, Palash Sarkar
Title : Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
In : In Proceedings of ISC -
[Abstract]

Somitra Kumar Sanadhya, Palash Sarkar - Non-linear Reduced Round Attacks against SHA-2 Hash Family
In Proceedings of ACISP, LNCS 5107, pp. 254-266, Springer, 2008
[Electronic Edition] [Bibtex]
Author : Somitra Kumar Sanadhya, Palash Sarkar
Title : Non-linear Reduced Round Attacks against SHA-2 Hash Family
In : In Proceedings of ACISP -
[Abstract]

Ivica Nikolic, Alex Biryukov - Collisions for Step-Reduced SHA-256
In Proceedings of FSE, LNCS 5086, pp. 1-15, Springer, 2008
[Electronic Edition] [Bibtex]
Author : Ivica Nikolic, Alex Biryukov
Title : Collisions for Step-Reduced SHA-256
In : In Proceedings of FSE -
[Abstract]

Somitra Kumar Sanadhya, Palash Sarkar - New Local Collisions for the SHA-2 Hash Family
In Proceedings of ICISC, LNCS 4817, pp. 193-205, Springer, 2007
[Electronic Edition] [Bibtex]
Author : Somitra Kumar Sanadhya, Palash Sarkar
Title : New Local Collisions for the SHA-2 Hash Family
In : In Proceedings of ICISC -
[Abstract]

Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen - Analysis of Step-Reduced SHA-256
In Proceedings of FSE, LNCS 4047, pp. 126-143, Springer, 2006
[Electronic Edition] [Bibtex]
Author : Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
Title : Analysis of Step-Reduced SHA-256
In : In Proceedings of FSE -
[Abstract]

Hirotaka Yoshida, Alex Biryukov - Analysis of a SHA-256 Variant
In Proceedings of Selected Areas in Cryptography, LNCS 3897, pp. 245-260, Springer, 2005
[Electronic Edition] [Bibtex]
Author : Hirotaka Yoshida, Alex Biryukov
Title : Analysis of a SHA-256 Variant
In : In Proceedings of Selected Areas in Cryptography -
[Abstract]

Henri Gilbert, Helena Handschuh - Security Analysis of SHA-256 and Sisters
In Proceedings of Selected Areas in Cryptography, LNCS 3006, pp. 175-193, Springer, 2003
[Electronic Edition] [Bibtex]
Author : Henri Gilbert, Helena Handschuh
Title : Security Analysis of SHA-256 and Sisters
In : In Proceedings of Selected Areas in Cryptography -
[Abstract]



2.4 Second Preimage Attacks


2.5 Preimage Attacks

Takanori Isobe, Kyoji Shibutani - Preimage Attacks on Reduced Tiger and SHA-2
In Proceedings of Fast Software Encryption -- FSE 2009, LNCS 5665, pp. 139-155, Springer, 2009
[Electronic Edition] [Bibtex]
Author : Takanori Isobe, Kyoji Shibutani
Title : Preimage Attacks on Reduced Tiger and SHA-2
In : In Proceedings of Fast Software Encryption -- FSE 2009 -
[Abstract]

2.6 Others

Personal tools