• Skip to content (access key 1)
  • Skip to search (access key 7)
FWF — Austrian Science Fund
  • Go to overview page Discover

    • Research Radar
      • Research Radar Archives 1974–1994
    • Discoveries
      • Emmanuelle Charpentier
      • Adrian Constantin
      • Monika Henzinger
      • Ferenc Krausz
      • Wolfgang Lutz
      • Walter Pohl
      • Christa Schleper
      • Elly Tanaka
      • Anton Zeilinger
    • Impact Stories
      • Verena Gassner
      • Wolfgang Lechner
      • Georg Winter
    • scilog Magazine
    • Austrian Science Awards
      • FWF Wittgenstein Awards
      • FWF ASTRA Awards
      • FWF START Awards
      • Award Ceremony
    • excellent=austria
      • Clusters of Excellence
      • Emerging Fields
    • In the Spotlight
      • 40 Years of Erwin Schrödinger Fellowships
      • Quantum Austria
    • Dialogs and Talks
      • think.beyond Summit
    • Knowledge Transfer Events
    • E-Book Library
  • Go to overview page Funding

    • Portfolio
      • excellent=austria
        • Clusters of Excellence
        • Emerging Fields
      • Projects
        • Principal Investigator Projects
        • Principal Investigator Projects International
        • Clinical Research
        • 1000 Ideas
        • Arts-Based Research
        • FWF Wittgenstein Award
      • Careers
        • ESPRIT
        • FWF ASTRA Awards
        • Erwin Schrödinger
        • doc.funds
        • doc.funds.connect
      • Collaborations
        • Specialized Research Groups
        • Special Research Areas
        • Research Groups
        • International – Multilateral Initiatives
        • #ConnectingMinds
      • Communication
        • Top Citizen Science
        • Science Communication
        • Book Publications
        • Digital Publications
        • Open-Access Block Grant
      • Subject-Specific Funding
        • AI Mission Austria
        • Belmont Forum
        • ERA-NET HERA
        • ERA-NET NORFACE
        • ERA-NET QuantERA
        • ERA-NET TRANSCAN
        • Alternative Methods to Animal Testing
        • European Partnership Biodiversa+
        • European Partnership BrainHealth
        • European Partnership ERA4Health
        • European Partnership ERDERA
        • European Partnership EUPAHW
        • European Partnership FutureFoodS
        • European Partnership OHAMR
        • European Partnership PerMed
        • European Partnership Water4All
        • Gottfried and Vera Weiss Award
        • netidee SCIENCE
        • Herzfelder Foundation Projects
        • Quantum Austria
        • Rückenwind Funding Bonus
        • WE&ME Award
        • Zero Emissions Award
      • International Collaborations
        • Belgium/Flanders
        • Germany
        • France
        • Italy/South Tyrol
        • Japan
        • Luxembourg
        • Poland
        • Switzerland
        • Slovenia
        • Taiwan
        • Tyrol–South Tyrol–Trentino
        • Czech Republic
        • Hungary
    • Step by Step
      • Find Funding
      • Submitting Your Application
      • International Peer Review
      • Funding Decisions
      • Carrying out Your Project
      • Closing Your Project
      • Further Information
        • Integrity and Ethics
        • Inclusion
        • Applying from Abroad
        • Personnel Costs
        • PROFI
        • Final Project Reports
        • Final Project Report Survey
    • FAQ
      • Project Phase PROFI
      • Project Phase Ad Personam
      • Expiring Programs
        • Elise Richter and Elise Richter PEEK
        • FWF START Awards
  • Go to overview page About Us

    • Mission Statement
    • FWF Video
    • Values
    • Facts and Figures
    • Annual Report
    • What We Do
      • Research Funding
        • Matching Funds Initiative
      • International Collaborations
      • Studies and Publications
      • Equal Opportunities and Diversity
        • Objectives and Principles
        • Measures
        • Creating Awareness of Bias in the Review Process
        • Terms and Definitions
        • Your Career in Cutting-Edge Research
      • Open Science
        • Open-Access Policy
          • Open-Access Policy for Peer-Reviewed Publications
          • Open-Access Policy for Peer-Reviewed Book Publications
          • Open-Access Policy for Research Data
        • Research Data Management
        • Citizen Science
        • Open Science Infrastructures
        • Open Science Funding
      • Evaluations and Quality Assurance
      • Academic Integrity
      • Science Communication
      • Philanthropy
      • Sustainability
    • History
    • Legal Basis
    • Organization
      • Executive Bodies
        • Executive Board
        • Supervisory Board
        • Assembly of Delegates
        • Scientific Board
        • Juries
      • FWF Office
    • Jobs at FWF
  • Go to overview page News

    • News
    • Press
      • Logos
    • Calendar
      • Post an Event
      • FWF Informational Events
    • Job Openings
      • Enter Job Opening
    • Newsletter
  • Discovering
    what
    matters.

    FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

    SOCIAL MEDIA

    • LinkedIn, external URL, opens in a new window
    • , external URL, opens in a new window
    • Facebook, external URL, opens in a new window
    • Instagram, external URL, opens in a new window
    • YouTube, external URL, opens in a new window

    SCILOG

    • Scilog — The science magazine of the Austrian Science Fund (FWF)
  • elane login, external URL, opens in a new window
  • Scilog external URL, opens in a new window
  • de Wechsle zu Deutsch

  

Analysis of modern cryptographic hash functions II

Analysis of modern cryptographic hash functions II

Vincent Rijmen (ORCID: 0000-0001-7401-2088)
  • Grant DOI 10.55776/P21936
  • Funding program Principal Investigator Projects
  • Status ended
  • Start February 1, 2010
  • End January 31, 2013
  • Funding amount € 383,386

Disciplines

Computer Sciences (60%); Mathematics (40%)

Keywords

    Cryptzography, Hash functions, Cryptanalysis, Symmetric cryptography, SHA-3

Abstract Final report

The strength of the security of electronic applications and systems relies on the security of the smallest building blocks. Cryptographic hash functions are one example of a ubiquitously deployed building block, with applications ranging from digital signatures, authentication protocols, random number generation and many more. Since the discovery of weaknesses in the most frequently used hash functions in 2005, an extensive amount of work has been invested in hash functions. The SHA-3 competition initiated by NIST in order to find the new standard in hash functions strongly motivates a growing need for fundamental and applied research to support the choice of the new worldwide hash standard. The proposed project wants to investigate in detail the security and foundations of modern hash functions. The first goal of the project is to analyze already established hash functions (e.g. the SHA-2 family, Whirlpool). An important point will be to further generalize the attack methods developed for SHA-1. The second target of the project is to extend the research to recently proposed hash functions within the SHA-3 competition. A third goal is to work towards foundations of hash functions security. It is of utmost importance to advance the state-of-the-art in hash function cryptanalysis and to attain a level of understanding that is comparable to the theory of block cipher cryptanalysis. The Krypto group at IAIK under the lead of Prof. Rijmen has established itself as one of the world`s most active institutions in hash function research. The contributions lie in the range of hash function cryptanalysis as well as hash function design and resulted in numerous publications in conference proceedings and journals. Furthermore, our staff is in charge of the working group on hash functions within the European Network of Excellence ECRYPT II.

Cryptographic hash functions are one security-critical building block for this digital economy. For example, when a document is signed by means of a digital signature (advanced electronic signature), a hash function is first used to compress the document resulting in a so-called fingerprint. For performance reasons, the raw signature using asymmetric techniques like RSA, DSA or ECDSA, is made on the fingerprint of the document only. For a digital signature scheme that uses a hash function for which collisions can be generated, forgeries can be generated from real signatures. For example, one could argue that with the current state of the art, it makes little sense to use the RSA signing primitive with key lengths of more than 2048 bits, since the security level of the hash functions used, is not as good anyway. In order to obtain the full picture on the security of digital signature applications, it is hence as important to do continuous evaluations of the security of cryptographic hash functions, as to stay up to date with the state of the art in e.g. factoring methods.Currently, almost all applications use as hash function RIPEMD-160, SHA-1, MD5 or SHA-2. Since the breakthrough results of Wang et al. hash functions have been the target in many cryptanalytic attacks. These attacks have especially shown that commonly used algorithms as MD5 and SHA-1 can no longer be considered as secure. For this reason, NIST has proposed the transition from SHA-1 to the SHA-2 family as a first solution. As a consequence, more and more companies and organizations are migrating to SHA-2. Furthermore, NIST has initiated an open competition for a new hash function standard, called SHA-3. Hence, there was a growing need for fundamental and applied research to support the choice of the new world wide hash standard and to evaluate the current standards.In this project, we have investigated the security of the SHA-2 family and several proposed alternatives. Furthermore, we contributed significantly to the international SHA-3 competition by providing analysis for several designs, including our own. Due to the increasing complexity in the design of hash functions, especially noticeable in the SHA-3 competition, the necessity of new and automated tools were apparent. We developed a new set of tools which is used to search automated for differential characteristics that hold with high probability. Our methods are based on recent developments in the cryptanalysis of hash functions. Besides the SHA-2 family, we also analyzed the security of many other hash functions against our methods. By linking the security of hash functions to more fundamental problems (coding theory and solving of nonlinear equations over finite fields), we were able to obtain better bounds on their security level. All our results significantly improved on previous ones and led to new insights in the analysis and design of cryptographic hash functions.

Research institution(s)
  • Technische Universität Graz - 100%

Research Output

  • 267 Citations
  • 19 Publications
Publications
  • 2012
    Title Differential Attacks on Reduced RIPEMD-160
    DOI 10.1007/978-3-642-33383-5_2
    Type Book Chapter
    Author Mendel F
    Publisher Springer Nature
    Pages 23-38
  • 2012
    Title Cryptanalysis of Round-Reduced HAS-160
    DOI 10.1007/978-3-642-31912-9_3
    Type Book Chapter
    Author Mendel F
    Publisher Springer Nature
    Pages 33-47
  • 2012
    Title Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl
    DOI 10.1007/978-3-642-35755-8_20
    Type Book Chapter
    Author Aoki K
    Publisher Springer Nature
    Pages 281-295
  • 2012
    Title Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128
    DOI 10.1007/978-3-642-34047-5_14
    Type Book Chapter
    Author Mendel F
    Publisher Springer Nature
    Pages 226-243
  • 2011
    Title BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl
    DOI 10.5220/0003515701240133
    Type Conference Proceeding Abstract
    Pages 124-133
    Link Publication
  • 2011
    Title Second-Order Differential Collisions for Reduced SHA-256
    DOI 10.1007/978-3-642-25385-0_15
    Type Book Chapter
    Author Biryukov A
    Publisher Springer Nature
    Pages 270-287
  • 2011
    Title Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
    DOI 10.1007/978-3-642-25385-0_16
    Type Book Chapter
    Author Mendel F
    Publisher Springer Nature
    Pages 288-307
  • 2011
    Title Boomerang Distinguisher for the SIMD-512 Compression Function
    DOI 10.1007/978-3-642-25578-6_19
    Type Book Chapter
    Author Mendel F
    Publisher Springer Nature
    Pages 255-269
  • 2011
    Title Memoryless near-collisions via coding theory
    DOI 10.1007/s10623-011-9484-2
    Type Journal Article
    Author Lamberger M
    Journal Designs, Codes and Cryptography
    Pages 1-18
  • 2011
    Title Preimage Attacks against PKC98-Hash and HAS-V
    DOI 10.1007/978-3-642-24209-0_5
    Type Book Chapter
    Author Sasaki Y
    Publisher Springer Nature
    Pages 68-91
  • 2013
    Title Finding Collisions for Round-Reduced SM3
    DOI 10.1007/978-3-642-36095-4_12
    Type Book Chapter
    Author Mendel F
    Publisher Springer Nature
    Pages 174-188
  • 2010
    Title Distinguishers for the Compression Function and Output Transformation of Hamsi-256
    DOI 10.1007/978-3-642-14081-5_6
    Type Book Chapter
    Author Aumasson J
    Publisher Springer Nature
    Pages 87-103
  • 2010
    Title Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
    DOI 10.1007/978-3-642-12678-9_25
    Type Book Chapter
    Author Gauravaram P
    Publisher Springer Nature
    Pages 419-436
  • 2011
    Title Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function
    DOI 10.1007/978-3-642-19574-7_25
    Type Book Chapter
    Author Schläffer M
    Publisher Springer Nature
    Pages 369-387
    Link Publication
  • 2011
    Title Optimal Covering Codes for Finding Near-Collisions
    DOI 10.1007/978-3-642-19574-7_13
    Type Book Chapter
    Author Lamberger M
    Publisher Springer Nature
    Pages 187-197
  • 2011
    Title Cryptanalysis of Luffa v2 Components
    DOI 10.1007/978-3-642-19574-7_26
    Type Book Chapter
    Author Khovratovich D
    Publisher Springer Nature
    Pages 388-409
    Link Publication
  • 2011
    Title Practical Attacks on the Maelstrom-0 Compression Function
    DOI 10.1007/978-3-642-21554-4_26
    Type Book Chapter
    Author Kölbl S
    Publisher Springer Nature
    Pages 449-461
  • 2013
    Title Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl
    DOI 10.1007/978-3-642-36095-4_10
    Type Book Chapter
    Author Holzer-Graf S
    Publisher Springer Nature
    Pages 145-161
  • 2013
    Title The Rebound Attack and Subspace Distinguishers: Application to Whirlpool
    DOI 10.1007/s00145-013-9166-5
    Type Journal Article
    Author Lamberger M
    Journal Journal of Cryptology
    Pages 257-296
    Link Publication

Discovering
what
matters.

Newsletter

FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

Contact

Austrian Science Fund (FWF)
Georg-Coch-Platz 2
(Entrance Wiesingerstraße 4)
1010 Vienna

office(at)fwf.ac.at
+43 1 505 67 40

General information

  • Job Openings
  • Jobs at FWF
  • Press
  • Philanthropy
  • scilog
  • FWF Office
  • Social Media Directory
  • LinkedIn, external URL, opens in a new window
  • , external URL, opens in a new window
  • Facebook, external URL, opens in a new window
  • Instagram, external URL, opens in a new window
  • YouTube, external URL, opens in a new window
  • Cookies
  • Whistleblowing/Complaints Management
  • Accessibility Statement
  • Data Protection
  • Acknowledgements
  • IFG-Form
  • Social Media Directory
  • © Österreichischer Wissenschaftsfonds FWF
© Österreichischer Wissenschaftsfonds FWF