Abstract
In this paper, we propose a new construction algorithm for finding differential paths of Round 1 of SHA-1 for use in the collision search attack. Generally, the differential path of Round 1 is very complex, and it takes much time to find one by hand. Therefore, we propose a new search algorithm that consists of three sub searches, naming the forward search, the backward search, and the joint search, so that we can find a differential path by computers. By implementing our new algorithm and doing some experiments on a computer, we actually found 383 differential paths in the joint search that are different from Wang’s. Since it is designed by quite a new policy, our algorithm can search a range of space that was not examined by existing algorithms.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
NIST. Secure hash standard. Federal Information Processing Standard, FIPS180-1 (April 1995)
Wang, X.: The Collision Attack on SHA-0 (in Chinese) (to appear), http://www.infosec.edu.cn
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)
Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions in SHA-0 and Reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 36–57. Springer, Heidelberg (2005)
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005)
Wang, X., Yao, A.C, Yao, F.: Cryptanalysis on SHA-1 Hash Function. Keynote Speech at CRYPTOGRAPHIC HASH WORKSHOP
Wang, X.: Cryptanalysis of Hash functions and Potential Dangers. Invited Talk at CT-RSA (2006)
Hawkes, P., Paddon, M., Rose, G.: Automated Search for Round 1 Differentials for SHA-1: Work in Progress. NIST SECOND CRYPTOGRAPHIC HASH WORKSHOP (August 2006)
Cannière, C.D., Rechberger, C.: Finding SHA-1 Characteristics. ASIACRYPT (2006)
Cannière, C.D., Rechberger, C.: Finding SHA-1 Characteristics: General Results and Applications. NIST SECOND CRYPTOGRAPHIC HASH WORKSHOP (August 2006)
Wang, X.: Private Communication in Japan
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Yajima, J. et al. (2007). A New Strategy for Finding a Differential Path of SHA-1. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds) Information Security and Privacy. ACISP 2007. Lecture Notes in Computer Science, vol 4586. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73458-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-73458-1_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73457-4
Online ISBN: 978-3-540-73458-1
eBook Packages: Computer ScienceComputer Science (R0)