Title | ||
---|---|---|
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack. |
Abstract | ||
---|---|---|
For an $n$-bit random permutation, there are three types of boomerang distinguishers, denoted as Type I, II and III, with generic complexities $2^{n}$, $2^{n/3}$ and $2^{n/2}$ respectively. in this paper, we try to evaluate the security margins of three hash functions namely SHA-512, SHA-256 and DHA-256 against the boomerang attack. firstly, we give a boomerang attack on 48-step SHA-512 with a practical complexity of $2^{51}$. the correctness of this attack is verified by providing a Type III boomerang quartet. then, we extend the existing differential characteristics of the three hash functions to more rounds. we deduce the sufficient conditions and give thorough evaluations to the security margins as follows: type I boomerang method can attack 54-step SHA-512, 51-step SHA-256 and 46-step DHA-256 with complexities $2^{480}$, $2^{218}$ and $2^{236}$ respectively. type II boomerang method can attack 51-step SHA-512, 49-step SHA-256 and 43-step DHA-256 with complexities $2^{158.50}$, $2^{72.91}$ and $2^{74.50}$ respectively. type III boomerang method can attack 52-step SHA-512, 50-step SHA-256 and 44-step DHA-256 with complexities $2^{223.80}$, $2^{123.63}$ and $2^{99.85}$ respectively. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1007/s11432-015-5389-4 | SCIENCE CHINA Information Sciences |
Keywords | Field | DocType |
SHA-512, SHA-256, DHA-256, hash functions, boomerang attack, SHA-512, SHA-2256, DHA-256, 飞去来器攻击 | Discrete mathematics,Mathematical optimization,Boomerang attack,Computer security,Correctness,Random permutation,Hash function,Mathematics | Journal |
Volume | Issue | ISSN |
59 | 5 | 1869-1919 |
Citations | PageRank | References |
1 | 0.36 | 24 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Hongbo Yu | 1 | 1782 | 114.27 |
Yonglin Hao | 2 | 9 | 2.27 |
Dongxia Bai | 3 | 21 | 3.94 |