Skip to main content
Log in

New strategy for searching disturbance vector of SHA-1 collision attack

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Manuel S. Classification and generation of disturbance vectors for collision attacks against SHA-1. Des Codes Cryptogr, 2011, 59: 247–263

    Article  MATH  MathSciNet  Google Scholar 

  2. Wang X Y, Yin Y L, Yu H B. Finding collisions in the full SHA-1. In: Proceedings of the 25th Annual International Conference on Advances in Cryptology, Santa Barbara, 2005. 17–36

    MATH  Google Scholar 

  3. Stevens M, Karpman P, Peyrin T. Freestart collision for full SHA-1. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2016

    Book  MATH  Google Scholar 

  4. Stevens M. New collision attacks on SHA-1 based on optimal joint local-collision analysis. In: Advances in Cryptology–EUROCRYPT. Berlin: Springer, 2013. 245–261

    MATH  Google Scholar 

  5. Jutla C S, Patthak A C. A matching lower bound on the minimum weight of SHA-1 expansion code. Iacr Cryptol Eprint Arch, 2005

    Google Scholar 

  6. Tang Y C, Zeng G, Han W B. Classification of disturbance vectors for collision attack in SHA-1. Sci China Inf Sci, 2015, 58: 112102

    MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61502532) and Open Project Program of the State Key Laboratory of Mathematical Engineering and Advanced Computing (Grant No. 2016A02).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hao Feng, Guang Zeng, Wenbao Han or Yang Yang.

Additional information

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Feng, H., Zeng, G., Han, W. et al. New strategy for searching disturbance vector of SHA-1 collision attack. Sci. China Inf. Sci. 60, 129101 (2017). https://doi.org/10.1007/s11432-016-9241-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-016-9241-x