State-of-the-art on Cryptanalysis of the SHA Family of Hash Functions

Event details
Date | 18.06.2014 |
Hour | 14:00 |
Speaker | Yu SASAKI, NTT - JAPAN |
Location | |
Category | Conferences - Seminars |
SHA-2 is a family of hash function which is internationally standardized and widely used all over the world. NIST determined to use SHA-2 continuously, even after the release of a new hash function standard SHA-3. From this background, the security analysis of SHA-2 deserves much attention. In this talk, the history of the cryptanalysis on SHA-2 is reviewed with respect to the following points.
1. Dedicated cryptanalysis on SHA-2 such as collision attack, preimage attack, various types of distinguisher.
2. Generic attack on a class of hash functions including the design of SHA-2.
3. Dedicated cryptanalysis on SHA-2 in the keyed usage such as MAC.
1. Dedicated cryptanalysis on SHA-2 such as collision attack, preimage attack, various types of distinguisher.
2. Generic attack on a class of hash functions including the design of SHA-2.
3. Dedicated cryptanalysis on SHA-2 in the keyed usage such as MAC.
Links
Practical information
- General public
- Free
Organizer
- Serge Vaudenay
Contact
- Sylvie Thomet