Abstract
This paper analyses the cryptographic hash function SHA-1 in encryption mode. A detailed analysis is given of the resistance of SHA-1 against the most powerful known attacks today. It is concluded that none of these attacks can be applied successfully in practice to SHA-1. Breaking SHA-1 in encryption mode requires either an unrealistic amount of computation time and known/chosen texts, or a major breakthrough in cryptanalysis. The original motivation for this analysis is to investigate a block cipher named SHACAL based on these principles. SHACAL has been submitted to the NESSIE call for cryptographic primitives.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
E. Biham, A. Shamir. Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
E. Biham, New types of cryptanalytic attacks using related keys. In Advances in Cryptology: EUROCRYPT’93, LNCS 765, pages 398–409. Springer-Verlag, 1994.
F. Chabaud and A. Joux. Differential collisions in SHA-0. In H. Krawczyk, editor, Advances in Cryptology: CRYPTO’98, LNCS 1462, pages 56–71. Springer Verlag, 1999.
H. Dobbertin. Cryptanalysis of MD5 compress. Presented at the rump session of EUROCRYPT’96, May 1996.
H. Dobbertin. Cryptanalysis of MD4. In Journal of Cryptology, vol. 11, n. 4, pages 253–271, Springer-Verlag, 1998.
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.
M. Matsui, Linear cryptanalysis method for DES cipher. In Advances in Cryptology EUROCRYPT’93, LNCS 765, pages 386–397. Springer-Verlag, 1993.
R.L. Rivest. The MD4 message digest algorithm. In S. Vanstone, editor, Advances in Cryptology-CRYPTO’90, LNCS 537, pages 303–311. Springer Verlag, 1991.
R.A. Rueppel. Analysis and Design of Stream Ciphers. Springer Verlag, 1986.
US Department of Commerce, N.I.S.T. Secure Hash Algorithm. n FIPS 180-1, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Handschuh, H., Knudsen, L.R., Robshaw, M.J. (2001). Analysis of SHA-1 in Encryption Mode. In: Naccache, D. (eds) Topics in Cryptology — CT-RSA 2001. CT-RSA 2001. Lecture Notes in Computer Science, vol 2020. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45353-9_7
Download citation
DOI: https://doi.org/10.1007/3-540-45353-9_7
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41898-6
Online ISBN: 978-3-540-45353-6
eBook Packages: Springer Book Archive