Journal of Applied Sciences

• Articles •     Next Articles

Structure Security of Compress Function of SHA-256

LI Chao1 WEI Yue-chuan1 SUN Bing2   

  1. 1. Department of Mathematics and System Science, National University of Defense Technology, Changsha 410073, China;
    2. State Key Laboratory of Mobile Communication, Southeast University, Nanjing 210096, China
  • Received:2006-11-01 Revised:2007-09-25 Online:2008-01-31 Published:2008-01-31

Abstract: The paper presents three kinds of variant forms of compression functions of SHA-256, and analyzes security of three variants against the Chabaud-Joux attack compared with SHA-256. The complexity of finding a local collision in SHA-2A is similar to SHA-256,SHA-2B does not exist a low complexity collision, but exist other faults in it’s structure,while SHA-2C is far insecure than SHA-256. Furthermore, a local collision in the vulnerable variant is presented. It follows that the selection of the compression function’s structure highly affects the complexity of the attacks.

Key words: Hash function, collision attack, local collision
,
SHA-256, SHA-256 variant, compress function