[Resource Topic] 2009/184: Cryptanalysis of Dynamic SHA(2)

Welcome to the resource topic for 2009/184

Title:
Cryptanalysis of Dynamic SHA(2)

Authors: Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel

Abstract:

In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash functions rely heavily on data-dependent rotations, similar to certain block ciphers, e.g., RC5. Our analysis suggests that in the case of hash functions, where the attacker has more control over the rotations, this approach is less favorable than in block ciphers. We present practical, or close to practical, collision attacks on both Dynamic SHA and Dynamic SHA2. Moreover, we present a preimage attack on Dynamic SHA that is faster than exhaustive search.

ePrint: https://eprint.iacr.org/2009/184

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .