报告人:刘富康
报告地点:淦昌苑D305
报告时间:2024-10-11 9:00
报告摘要:
In this talk, I will revisit the main idea in Wang et al.’s attacks on MD-SHA hash family, and describe how to use automatic tools to efficiently find the so-called signed differential characteristic for such hash functions. This automatic technique mainly benefits from an efficient method to describe how signed differences propagate through the modular addition and Boolean functions. For better understanding, I will use a simple example to explain all related problems and techniques to solve them. This automatic technique is quite general and has been used to achieve new collision attacks on RIPEMD-160 and SHA-2 family, which have been published at EUROCRYPT, ASIACRYPT and FSE.
报告人简介:
Fukang Liu obtained his PhD from East China Normal University in 2021, and is working as an assistant professor at Tokyo Institute of Technology. His main research interest includes hash function and MPC/FHE/ZK-friendly symmetric-key primitives. For his research achievements, he has published several papers at top international conferences including FSE、CHES、ASIACRYPT、EUROCRYPT and CRYPTO. In particular, he also received the best-paper award at FSE 2022.
邀请人:胡凯
审核人:魏普文