Главная
Study mode:
on
1
Intro
2
KECCAK hash functions
3
Inner collision attack on the sponge mode
4
General description of the attack
5
Summary of our results
6
Abstract
7
Research problem
8
Related work
9
Methodology
10
Outline
11
Round Function of Keccak-f
12
Frame of Linear Analysis
13
Improvement of Old Strategy
14
Freedom Reuse Strategy
15
Improved Preimage Attack
16
Zero Coefficient
17
Bit Recovery
18
Freedom Return
19
Analysis Results
20
Frame of Preimage Attack
21
Motivation
22
Hirose's Compression Function (HCF)
23
Finding Collisions on HCF
24
Generic Classical Methods to Find Collisions
25
Generic Quantum Methods to Find Collisions
26
Rebound Attack Assumption
27
Classical Rebound Attack to Find Collisions
28
New Differential Trail for 10-round AES-256
29
Quantum Collision Attack on 10-Round HCF-AES-256
30
Summary of Our Attacks on HCF-AES-256
31
Conclusion and Future Works
32
Grover's Algorithm
33
Super S-box Cryptanalysis Gilbert and Peyrin (4)
34
Rebound Attack by Mendel et al. 3 at FSE 2009.
35
Collision attack on 9-round Simpira-2
36
(Quantum) Collision attack on 11-round Simpira-4
37
Collision Attacks on Other Variants of Simpira-4
38
Summary of the results for Simpira v2
Description:
Explore hash function cryptanalysis in this 56-minute conference talk from TheIACR. Delve into KECCAK hash functions, inner collision attacks on the sponge mode, and improved preimage attacks. Learn about Hirose's Compression Function (HCF) and methods for finding collisions, including classical and quantum approaches. Examine the rebound attack assumption and its application to AES-256. Discover Grover's Algorithm, super S-box cryptanalysis, and collision attacks on Simpira variants. Gain insights into cutting-edge research on hash function security and cryptanalytic techniques.

Hash Function Cryptanalysis - Session 14

TheIACR
Add to list