A Heuristic for Finding Compatible Differential Paths with Application to HAS-160

Download Now
Provided by: Concordia University
Topic: Security
Format: PDF
The question of compatibility of differential paths plays a central role in second order collision attacks on hash functions. In this paper, attacks typically proceed by starting from the middle and constructing the middle-steps quartet in which the two paths are enforced on the respective faces of the quartet structure. Finding paths that can t in such a quartet structure has been a major challenge and the currently known compatible paths extend over a suboptimal number of steps for hash functions such as SHA-2 and HAS-160.
Download Now

Find By Topic