In this work, we study the application of higher-order differential attacks on hash functions. We show a second-order differential attack on the SHA-256 compression function reduced to 46 out of 64 steps. We implemented the attack and give the result in Table 1. The best attack so far (in a different attack model) with practical complexity was for 33 steps of the compression function.
%0 Journal Article
%1 noauthororeditor
%A Lamberger, Mario
%A Mendel, Florian
%D unknown
%K cryptography differentialCryptanalysis hashFunctions
%T Higher-Order Differential Attack on Reduced SHA-256
%U https://eprint.iacr.org/2011/037.pdf
%X In this work, we study the application of higher-order differential attacks on hash functions. We show a second-order differential attack on the SHA-256 compression function reduced to 46 out of 64 steps. We implemented the attack and give the result in Table 1. The best attack so far (in a different attack model) with practical complexity was for 33 steps of the compression function.
@article{noauthororeditor,
abstract = {In this work, we study the application of higher-order differential attacks on hash functions. We show a second-order differential attack on the SHA-256 compression function reduced to 46 out of 64 steps. We implemented the attack and give the result in Table 1. The best attack so far (in a different attack model) with practical complexity was for 33 steps of the compression function.},
added-at = {2018-08-17T11:48:19.000+0200},
author = {Lamberger, Mario and Mendel, Florian},
biburl = {https://www.bibsonomy.org/bibtex/2b99cd54d8b2cc176a0296aed88e8dda1/overleaf},
interhash = {5fdc2b1f60a3d32bfb91b19a907d3ad3},
intrahash = {b99cd54d8b2cc176a0296aed88e8dda1},
keywords = {cryptography differentialCryptanalysis hashFunctions},
language = {English},
timestamp = {2018-08-17T11:48:19.000+0200},
title = {Higher-Order Differential Attack on Reduced SHA-256},
url = {https://eprint.iacr.org/2011/037.pdf},
year = {unknown}
}