Paper 2014/945

Boomerang Attack on Step-Reduced SHA-512

Hongbo Yu and Dongxia Bai

Abstract

SHA-2 (SHA-224, SHA-256, SHA-384 and SHA-512) is hash function family issued by the National Institute of Standards and Technology (NIST) in 2002 and is widely used all over the world. In this work, we analyze the security of SHA-512 with respect to boomerang attack. Boomerang distinguisher on SHA-512 compression function reduced to 48 steps is proposed, with a practical complexity of $2^{51}$. A practical example of the distinguisher for 48-step SHA-512 is also given. As far as we know, it is the best practical attack on step-reduced SHA-512.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Inscrypt 2014
Keywords
SHA-512hash functionsboomerang attack
Contact author(s)
yuhongbo @ mail tsinghua edu cn
History
2014-11-19: received
Short URL
https://ia.cr/2014/945
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/945,
      author = {Hongbo Yu and Dongxia Bai},
      title = {Boomerang Attack on Step-Reduced SHA-512},
      howpublished = {Cryptology ePrint Archive, Paper 2014/945},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/945}},
      url = {https://eprint.iacr.org/2014/945}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.