Analysis of the cryptographic strength of the SHA-256 hash function using the SAT approach
Annotation
Cryptographic hash functions play a significant role in modern information security systems by ensuring data integrity and enabling efficient data compression. One of the most important and widely used cryptographic hash functions is SHA-256 that belongs to the SHA-2 family. In this regard, the study of SHA-256 cryptographic resistance using modern cryptanalysis approaches to preimage and collision attacks with an emphasis on the practical feasibility of such attacks is an urgent scientific task. To search for preimages of round-reduced versions of the SHA-256 compression function, the logical cryptanalysis was applied, i.e., cryptanalysis problems were reduced to the Boolean satisfiability problem (SAT). For collision attacks, a combination of logical and differential cryptanalysis was utilized. The work presents a comparison between various methods for reducing the SHA-256 compression function to SAT and evaluates their efficiency. As a result of the work, preimages for 17- and 18-round SHA-256 compression functions were found for the first time as well as preimages for a weakened 19-round compression function. Basic differential paths were constructed, which facilitated faster finding of collisions for the 18-round compression function. Known differential paths were reduced in SAT leading to finding collisions for the 19-round compression function. The work demonstrates the possibility of combining two cryptanalysis methods to enhance the efficiency of analyzing cryptographic algorithms. The results of the study confirm that the full-round SHA-256 hash function remains resistant to preimage and collision attacks within the scope of the applied SAT-based approach.
Keywords
Постоянный URL
Articles in current issue
- Explainability and interpretability are important aspects in ensuring the security of decisions made by intelligent systems (review article)
- Intensification of sol-gel synthesis of Mn-containing MgO-Al2O3-ZrO2-SiO2 system materials
- Conformational properties of polymer brushes with aggrecan-like macromolecules under strong stretching conditions on a cubic lattice
- Atmospheric air-phase singlet oxygen generator for practical multifunctional applications
- Two-stage algorithm for underwater image recovery for marine exploration
- Investigation of the possibility of using evolutionary algorithms for conditional generation of attributed graphs
- Analysis of the applicability of existing secret separation schemes in the post-quaternary era
- Deep learning-enhanced contour interpolation techniques for 3D carotid vessel wall segmentation
- Detecting fraud activities in financial transactions using SMOTENN model
- A deep learning approach for adaptive electrocardiogram-based authentication in an internet of things enabled telehealth system
- Method for identifying the active module in biological graphs with multi-component vertex weights
- Modeling of nonlocal porous functionally graded nanobeams under moving loads
- Design of the microelectromechanical logic element based on a comb-drive resonator
- Critical loads of antisymmetric and mixed forms of buckling of a CCCC-nanoplate under biaxial compression
- On the properties of compromise M-estimators optimizing weighted L2-norm of the influence function
- Combined approach to fault detection in complex technical systems based on bond-graph model
- Feature extraction methods for metagenome de Bruijn graphs collections based on samples classification information
- Automatic calibration of the receiving line of information and control systems in real time
- Model for storing spatial data of tensor geophysical fields
- Boundary estimation of the reliability of cluster systems based on the decomposition of the Markov model with limited recovery of nodes with accumulated failures