On the Preimage Resistance of SHA-1
<iframe src="http://research.microsoft.com/apps/video/ifVideo.aspx?id=153985" sandbox="allow-scripts allow-top-navigation allow-same-origin allow-popups" style="width:640px; height:480px; overflow:hidden; border:none;" scrolling="no"></iframe>

We show that preimages of SHA-1 can be computed at the cost of 2159.3 compression function computations. For variants with a reduced number of steps we obtain significantly faster attacks than previously known. The best previous attack was on 48 (of 80) steps with a complexity of 2159.3. Our attack on this variant has complexity 2152.1. The new results heavily rely on the linear message expansion and the low diffusion of the step transformation. The techniques in this paper apply to any hash function with linear message expansion.

In the talk we will provide a general introduction to meet-in-the-middle preimage attacks on hash functions.

©2011 Microsoft Corporation. All rights reserved.