首页 | 本学科首页   官方微博 | 高级检索  
     


Second order collision for the 42-step reduced DHA-256 hash function
Authors:Riham AlTawy  Aleksandar Kircanski  Amr Youssef
Affiliation:Concordia Institute for Information Systems Engineering (CIISE), Concordia University, 1455 De Maisonneuve Blvd. W., Montreal, Quebec, H3G 1M8, Canada
Abstract:At the Cryptographic Hash Workshop hosted by NIST in 2005, Lee et al. proposed the DHA-256 (Double Hash Algorithm-256) hash function. The design of DHA-256 builds upon the design of SHA-256, but introduces additional strengthening features such as optimizing the message expansion and step function against local collision attacks. Previously, DHA-256 was analyzed by J. Zhong and X. Lai, who presented a preimage attack on 35 steps of the compression function with complexity 2239.6. In addition, the IAIK Krypto Group provided evidence that there exists a 9-step local collision for the DHA-256 compression function with probability higher than previously predicted. In this paper, we analyze DHA-256 in the context of higher order differential attacks. In particular, we provide a practical distinguisher for 42 out of 64 steps and give an example of a colliding quartet to validate our results.
Keywords:Cryptography  Cryptanalysis  Hash functions  Second order collisions  Boomerang attack  DHA-256
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号