A strict evaluation method on the number of conditions for the SHA-1 collision search

  • Authors:
  • Jun Yajima;Terutoshi Iwasaki;Yusuke Naito;Yu Sasaki;Takeshi Shimoyama;Noboru Kunihiro;Kazuo Ohta

  • Affiliations:
  • Fujitsu Laboratories Ltd., Kawasaki, Kanagawa, Japan;Chuo-University, Tokyo, Japan;The University of Electro-Communications, Tokyo, Japan;The University of Electro-Communications, Tokyo, Japan;Fujitsu Laboratories Ltd., Kanagawa, Japan;The University of Electro-Communications, Tokyo, Japan;The University of Electro-Communications, Tokyo, Japan

  • Venue:
  • Proceedings of the 2008 ACM symposium on Information, computer and communications security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper proposes a new algorithm for evaluating the number of chaining variable conditions(CVCs) in the selecting step of a distrubance vector (DV) for the analysis of SHA-1 collision attack. The algorithm is constructed by combining the following four strategies, "Strict Differential Bit Compression", "DV expansion", "Precise Counting Rules in Every Step" and "Differential Path Confirmation for Rounds 2 to 4", that can evaluate the number of CVCs morestrictly compared with the previous approach.