{"title":"哈希函数分析的新方法","authors":"A. Levina, Andrew Plotnikov, Efim Ashmarov","doi":"10.1109/MECO58584.2023.10154990","DOIUrl":null,"url":null,"abstract":"This paper will illustrate a new class of analysis off hash functions. The method will be demonstrated on the algorithm SHA-256. The idea behind the attack is to represent the algorithm as Boolean equations and solve them using tree notation. The new attack will help to speed up the process of finding vulnerabilities in hash functions, which may help to create more secure hash functions in the future. Despite the fact that the article will describe the approbation of the method only on SHA-256, these results can also be extrapolated to other hashing algorithms, since the idea, presented in this method, does not depend on an algorithm specification.","PeriodicalId":187825,"journal":{"name":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"New Method of Hash Functions Analysis\",\"authors\":\"A. Levina, Andrew Plotnikov, Efim Ashmarov\",\"doi\":\"10.1109/MECO58584.2023.10154990\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper will illustrate a new class of analysis off hash functions. The method will be demonstrated on the algorithm SHA-256. The idea behind the attack is to represent the algorithm as Boolean equations and solve them using tree notation. The new attack will help to speed up the process of finding vulnerabilities in hash functions, which may help to create more secure hash functions in the future. Despite the fact that the article will describe the approbation of the method only on SHA-256, these results can also be extrapolated to other hashing algorithms, since the idea, presented in this method, does not depend on an algorithm specification.\",\"PeriodicalId\":187825,\"journal\":{\"name\":\"2023 12th Mediterranean Conference on Embedded Computing (MECO)\",\"volume\":\"280 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 12th Mediterranean Conference on Embedded Computing (MECO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MECO58584.2023.10154990\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 12th Mediterranean Conference on Embedded Computing (MECO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MECO58584.2023.10154990","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper will illustrate a new class of analysis off hash functions. The method will be demonstrated on the algorithm SHA-256. The idea behind the attack is to represent the algorithm as Boolean equations and solve them using tree notation. The new attack will help to speed up the process of finding vulnerabilities in hash functions, which may help to create more secure hash functions in the future. Despite the fact that the article will describe the approbation of the method only on SHA-256, these results can also be extrapolated to other hashing algorithms, since the idea, presented in this method, does not depend on an algorithm specification.