Analysis of modern cryptographic hash functions II
Analysis of modern cryptographic hash functions II
Disciplines
Computer Sciences (60%); Mathematics (40%)
Keywords
-
Cryptzography,
Hash functions,
Cryptanalysis,
Symmetric cryptography,
SHA-3
The strength of the security of electronic applications and systems relies on the security of the smallest building blocks. Cryptographic hash functions are one example of a ubiquitously deployed building block, with applications ranging from digital signatures, authentication protocols, random number generation and many more. Since the discovery of weaknesses in the most frequently used hash functions in 2005, an extensive amount of work has been invested in hash functions. The SHA-3 competition initiated by NIST in order to find the new standard in hash functions strongly motivates a growing need for fundamental and applied research to support the choice of the new worldwide hash standard. The proposed project wants to investigate in detail the security and foundations of modern hash functions. The first goal of the project is to analyze already established hash functions (e.g. the SHA-2 family, Whirlpool). An important point will be to further generalize the attack methods developed for SHA-1. The second target of the project is to extend the research to recently proposed hash functions within the SHA-3 competition. A third goal is to work towards foundations of hash functions security. It is of utmost importance to advance the state-of-the-art in hash function cryptanalysis and to attain a level of understanding that is comparable to the theory of block cipher cryptanalysis. The Krypto group at IAIK under the lead of Prof. Rijmen has established itself as one of the world`s most active institutions in hash function research. The contributions lie in the range of hash function cryptanalysis as well as hash function design and resulted in numerous publications in conference proceedings and journals. Furthermore, our staff is in charge of the working group on hash functions within the European Network of Excellence ECRYPT II.
Cryptographic hash functions are one security-critical building block for this digital economy. For example, when a document is signed by means of a digital signature (advanced electronic signature), a hash function is first used to compress the document resulting in a so-called fingerprint. For performance reasons, the raw signature using asymmetric techniques like RSA, DSA or ECDSA, is made on the fingerprint of the document only. For a digital signature scheme that uses a hash function for which collisions can be generated, forgeries can be generated from real signatures. For example, one could argue that with the current state of the art, it makes little sense to use the RSA signing primitive with key lengths of more than 2048 bits, since the security level of the hash functions used, is not as good anyway. In order to obtain the full picture on the security of digital signature applications, it is hence as important to do continuous evaluations of the security of cryptographic hash functions, as to stay up to date with the state of the art in e.g. factoring methods.Currently, almost all applications use as hash function RIPEMD-160, SHA-1, MD5 or SHA-2. Since the breakthrough results of Wang et al. hash functions have been the target in many cryptanalytic attacks. These attacks have especially shown that commonly used algorithms as MD5 and SHA-1 can no longer be considered as secure. For this reason, NIST has proposed the transition from SHA-1 to the SHA-2 family as a first solution. As a consequence, more and more companies and organizations are migrating to SHA-2. Furthermore, NIST has initiated an open competition for a new hash function standard, called SHA-3. Hence, there was a growing need for fundamental and applied research to support the choice of the new world wide hash standard and to evaluate the current standards.In this project, we have investigated the security of the SHA-2 family and several proposed alternatives. Furthermore, we contributed significantly to the international SHA-3 competition by providing analysis for several designs, including our own. Due to the increasing complexity in the design of hash functions, especially noticeable in the SHA-3 competition, the necessity of new and automated tools were apparent. We developed a new set of tools which is used to search automated for differential characteristics that hold with high probability. Our methods are based on recent developments in the cryptanalysis of hash functions. Besides the SHA-2 family, we also analyzed the security of many other hash functions against our methods. By linking the security of hash functions to more fundamental problems (coding theory and solving of nonlinear equations over finite fields), we were able to obtain better bounds on their security level. All our results significantly improved on previous ones and led to new insights in the analysis and design of cryptographic hash functions.
- Technische Universität Graz - 100%
Research Output
- 267 Citations
- 19 Publications
-
2012
Title Differential Attacks on Reduced RIPEMD-160 DOI 10.1007/978-3-642-33383-5_2 Type Book Chapter Author Mendel F Publisher Springer Nature Pages 23-38 -
2012
Title Cryptanalysis of Round-Reduced HAS-160 DOI 10.1007/978-3-642-31912-9_3 Type Book Chapter Author Mendel F Publisher Springer Nature Pages 33-47 -
2012
Title Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl DOI 10.1007/978-3-642-35755-8_20 Type Book Chapter Author Aoki K Publisher Springer Nature Pages 281-295 -
2012
Title Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128 DOI 10.1007/978-3-642-34047-5_14 Type Book Chapter Author Mendel F Publisher Springer Nature Pages 226-243 -
2011
Title BYTE SLICING GRØSTL - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl DOI 10.5220/0003515701240133 Type Conference Proceeding Abstract Pages 124-133 Link Publication -
2011
Title Second-Order Differential Collisions for Reduced SHA-256 DOI 10.1007/978-3-642-25385-0_15 Type Book Chapter Author Biryukov A Publisher Springer Nature Pages 270-287 -
2011
Title Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions DOI 10.1007/978-3-642-25385-0_16 Type Book Chapter Author Mendel F Publisher Springer Nature Pages 288-307 -
2011
Title Boomerang Distinguisher for the SIMD-512 Compression Function DOI 10.1007/978-3-642-25578-6_19 Type Book Chapter Author Mendel F Publisher Springer Nature Pages 255-269 -
2011
Title Memoryless near-collisions via coding theory DOI 10.1007/s10623-011-9484-2 Type Journal Article Author Lamberger M Journal Designs, Codes and Cryptography Pages 1-18 -
2011
Title Preimage Attacks against PKC98-Hash and HAS-V DOI 10.1007/978-3-642-24209-0_5 Type Book Chapter Author Sasaki Y Publisher Springer Nature Pages 68-91 -
2013
Title Finding Collisions for Round-Reduced SM3 DOI 10.1007/978-3-642-36095-4_12 Type Book Chapter Author Mendel F Publisher Springer Nature Pages 174-188 -
2010
Title Distinguishers for the Compression Function and Output Transformation of Hamsi-256 DOI 10.1007/978-3-642-14081-5_6 Type Book Chapter Author Aumasson J Publisher Springer Nature Pages 87-103 -
2010
Title Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 DOI 10.1007/978-3-642-12678-9_25 Type Book Chapter Author Gauravaram P Publisher Springer Nature Pages 419-436 -
2011
Title Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function DOI 10.1007/978-3-642-19574-7_25 Type Book Chapter Author Schläffer M Publisher Springer Nature Pages 369-387 Link Publication -
2011
Title Optimal Covering Codes for Finding Near-Collisions DOI 10.1007/978-3-642-19574-7_13 Type Book Chapter Author Lamberger M Publisher Springer Nature Pages 187-197 -
2011
Title Cryptanalysis of Luffa v2 Components DOI 10.1007/978-3-642-19574-7_26 Type Book Chapter Author Khovratovich D Publisher Springer Nature Pages 388-409 Link Publication -
2011
Title Practical Attacks on the Maelstrom-0 Compression Function DOI 10.1007/978-3-642-21554-4_26 Type Book Chapter Author Kölbl S Publisher Springer Nature Pages 449-461 -
2013
Title Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl DOI 10.1007/978-3-642-36095-4_10 Type Book Chapter Author Holzer-Graf S Publisher Springer Nature Pages 145-161 -
2013
Title The Rebound Attack and Subspace Distinguishers: Application to Whirlpool DOI 10.1007/s00145-013-9166-5 Type Journal Article Author Lamberger M Journal Journal of Cryptology Pages 257-296 Link Publication