Quantum collision attacks on reduced SHA-256 and SHA-512
From MaRDI portal
Publication:2120096
DOI10.1007/978-3-030-84242-0_22zbMath1487.81066OpenAlexW3159710217MaRDI QIDQ2120096
Publication date: 31 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84242-0_22
hash functioncollision attacksymmetric key cryptographyquantum attackSHA-256conversion from semi-free-start collisionsSHA-512
Cryptography (94A60) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (12)
New results on quantum boomerang attacks ⋮ Quantum key recovery attacks on tweakable Even-Mansour ciphers ⋮ Improved attacks against reduced-round Whirlwind ⋮ Triangulating rebound attack on AES-like hashing ⋮ Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting ⋮ A note on the post-quantum security of (ring) signatures ⋮ Nostradamus goes quantum ⋮ Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ New constructions of collapsing hashes ⋮ Simplified MITM modeling for permutations: new (quantum) attacks ⋮ Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
Cites Work
- Unnamed Item
- Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions
- The first collision for full SHA-1
- An efficient quantum collision search algorithm and implications on symmetric cryptography
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- Collisions and semi-free-start collisions for round-reduced RIPEMD-160
- New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions
- Quantum collision attacks on AES-like hashing with low quantum random access memories
- Analysis of SHA-512/224 and SHA-512/256
- Improved Cryptanalysis of Reduced RIPEMD-160
- Branching Heuristics in Differential Collision Search with Applications to SHA-512
- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
- Second-Order Differential Collisions for Reduced SHA-256
- Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
- Cryptanalysis of Round-Reduced HAS-160
- Preimage Attacks on Reduced Tiger and SHA-2
- Collisions for Step-Reduced SHA-256
- Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family
- Analysis of Step-Reduced SHA-256
- Collisions and Other Non-random Properties for Step-Reduced SHA-256
- Preimages for Step-Reduced SHA-2
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2
- Finding Collisions for Round-Reduced SM3
- Cryptanalysis of Full RIPEMD-128
- Improving Local Collisions: New Attacks on Reduced SHA-256
- New Collision Attacks against Up to 24-Step SHA-2
- Quantum cryptanalysis of hash and claw-free functions
This page was built for publication: Quantum collision attacks on reduced SHA-256 and SHA-512