Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants

Author:

Vaughn Riley1,Borowczak Mike2ORCID

Affiliation:

1. Department of Electrical Engineering and Computer Science, University of Wyoming, Laramie, WY 82071, USA

2. Department of Electrical and Computer Engineering, University of Central Florida, Orlando, FL 32816, USA

Abstract

The measure of diffusion, the property of dissipating patterns and statistical structures in cryptographic transformations, serves as a valuable heuristic for assessing the obscurity of patterns that could lead to collisions. As with many cryptographic hash functions, SHA-256 is thought to exhibit the property of diffusion. While SHA-256’s diffuse output is loosely documented, even less is known about how the diffusion rate changes across the 64 rounds in its compression function and how the algorithm’s individual sub-functions contribute to the overall diffusion. The diffusion of the unmodified compression function is initially measured using the Strict Avalanche Criterion (SAC), with the aim of understanding the alteration in diffusion across the 64 rounds of compression. The level to which sub-functions affect diffusion is subsequently measured, enabling potential prioritization of these sub-functions in future collision attacks. To accomplish this, the compression function is modified by removing sub-functions, and the diffusion of these new variants is measured. While the SAC measurements of each function eventually plateau close to the 50% target, no function, including the unmodified compression function, strictly meets the SAC, and multiple variant functions diffuse at comparatively slower rates.

Funder

IO Global

Publisher

MDPI AG

Reference21 articles.

1. (2002). FIPS pub 180-2 Secure Hash Standard (Standard No. NIST:180-2).

2. (2015). FIPS pub 180-4 Secure Hash Standard (Standard No. NIST:180-4).

3. Rescorla, E. (2018). The Transport Layer Security (TLS) Protocol Version 1.3, RFC Editor.

4. Nakamoto, S. (2024, September 07). Bitcoin: A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf.

5. Handschuh, H., and Gilbert, H. (2009, January 27–28). The Evaluation Report of SHA-256 Crypt Analysis Hash Function. Proceedings of the 2009 International Conference on Communication Software and Networks, Chengdu, China.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3