Welcome to the resource topic for 2011/037
Title:
Higher-Order Differential Attack on Reduced SHA-256
Authors: Mario Lamberger, Florian Mendel
Abstract:In this work, we study the application of higher-order differential attacks on hash functions. We show a second-order differential attack on the SHA-256 compression function reduced to 46 out of 64 steps. We implemented the attack and give the result in Table 1. The best attack so far (in a different attack model) with practical complexity was for 33 steps of the compression function.
ePrint: https://eprint.iacr.org/2011/037
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .