Skip to main content

Analysis of SHA-1 in Encryption Mode

  • Conference paper
  • First Online:
Topics in Cryptology — CT-RSA 2001 (CT-RSA 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2020))

Included in the following conference series:

Abstract

This paper analyses the cryptographic hash function SHA-1 in encryption mode. A detailed analysis is given of the resistance of SHA-1 against the most powerful known attacks today. It is concluded that none of these attacks can be applied successfully in practice to SHA-1. Breaking SHA-1 in encryption mode requires either an unrealistic amount of computation time and known/chosen texts, or a major breakthrough in cryptanalysis. The original motivation for this analysis is to investigate a block cipher named SHACAL based on these principles. SHACAL has been submitted to the NESSIE call for cryptographic primitives.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E. Biham, A. Shamir. Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.

    Google Scholar 

  2. E. Biham, New types of cryptanalytic attacks using related keys. In Advances in Cryptology: EUROCRYPT’93, LNCS 765, pages 398–409. Springer-Verlag, 1994.

    Google Scholar 

  3. F. Chabaud and A. Joux. Differential collisions in SHA-0. In H. Krawczyk, editor, Advances in Cryptology: CRYPTO’98, LNCS 1462, pages 56–71. Springer Verlag, 1999.

    Book  Google Scholar 

  4. H. Dobbertin. Cryptanalysis of MD5 compress. Presented at the rump session of EUROCRYPT’96, May 1996.

    Google Scholar 

  5. H. Dobbertin. Cryptanalysis of MD4. In Journal of Cryptology, vol. 11, n. 4, pages 253–271, Springer-Verlag, 1998.

    Article  MATH  Google Scholar 

  6. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.

    Google Scholar 

  7. M. Matsui, Linear cryptanalysis method for DES cipher. In Advances in Cryptology EUROCRYPT’93, LNCS 765, pages 386–397. Springer-Verlag, 1993.

    Google Scholar 

  8. R.L. Rivest. The MD4 message digest algorithm. In S. Vanstone, editor, Advances in Cryptology-CRYPTO’90, LNCS 537, pages 303–311. Springer Verlag, 1991.

    Google Scholar 

  9. R.A. Rueppel. Analysis and Design of Stream Ciphers. Springer Verlag, 1986.

    Google Scholar 

  10. US Department of Commerce, N.I.S.T. Secure Hash Algorithm. n FIPS 180-1, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Handschuh, H., Knudsen, L.R., Robshaw, M.J. (2001). Analysis of SHA-1 in Encryption Mode. In: Naccache, D. (eds) Topics in Cryptology — CT-RSA 2001. CT-RSA 2001. Lecture Notes in Computer Science, vol 2020. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45353-9_7

Download citation

  • DOI: https://doi.org/10.1007/3-540-45353-9_7

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41898-6

  • Online ISBN: 978-3-540-45353-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics