TY - GEN
T1 - Cryptanalysis of dynamic SHA(2)
AU - Aumasson, Jean Philippe
AU - Dunkelman, Orr
AU - Indesteege, Sebastiaan
AU - Preneel, Bart
PY - 2009
Y1 - 2009
N2 - In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5. Our analysis suggests that in the case of hash functions, where the attacker has more control over the rotations, this approach is less favorable than in block ciphers. We present practical, or close to practical, collision attacks on both Dynamic SHA and Dynamic SHA2. Moreover, we present a preimage attack on Dynamic SHA that is faster than exhaustive search.
AB - In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5. Our analysis suggests that in the case of hash functions, where the attacker has more control over the rotations, this approach is less favorable than in block ciphers. We present practical, or close to practical, collision attacks on both Dynamic SHA and Dynamic SHA2. Moreover, we present a preimage attack on Dynamic SHA that is faster than exhaustive search.
KW - Collision attack
KW - Dynamic SHA
KW - Dynamic SHA2
KW - Hash function
KW - SHA-3 candidate
UR - http://www.scopus.com/inward/record.url?scp=70549086854&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-05445-7_26
DO - 10.1007/978-3-642-05445-7_26
M3 - Conference contribution
AN - SCOPUS:70549086854
SN - 3642054439
SN - 9783642054433
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 415
EP - 432
BT - Selected Areas in Cryptography - 16th Annual International Workshop, SAC 2009, Revised Selected Papers
T2 - 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009
Y2 - 13 August 2009 through 14 August 2009
ER -