The First Practical Collision for 31-Step SHA-256

  • Yingxin Li
  • , Fukang Liu
  • , Gaoli Wang*
  • , Xiaoyang Dong
  • , Siwei Sun
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

SHA-256 is a hash function standardized by NIST and has been widely deployed in real-world applications, e.g., Bitcoin. Recently, an improved collision attack on 31-step SHA-256 was proposed by Li-Liu-Wang at EUROCRYPT 2024, whose time and memory complexity are 249.8 and 248, respectively. Such a result indicates that we are close to a practical collision attack on 31-step SHA-256, and that the current bottleneck is the memory complexity. To overcome such an obstacle, we develop a novel memory-efficient attack in this paper, which allows us to find the first practical colliding message pair for 31-step SHA-256 in only 1.2 h with 64 threads and negligible memory. This technique is general and Li-Liu-Wang’s collision attack on 31-step SHA-512 can also be significantly improved, i.e., the time and memory complexity can be improved by a factor of 220.9 and 242.1, respectively. Although we have set a new record in the practical collision attack on SHA-256, which improves the previous best practical attack published at EUROCRYPT 2013 by 3 steps, the attack is still far from threatening the security of SHA-256 since it has 64 steps in total. On the other hand, our new attack shows that nearly half of full SHA-256 can be practically cracked now, and it should be viewed as a major progress in the cryptanalysis of SHA-256 since 2013.

Original languageEnglish
Title of host publicationAdvances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsKai-Min Chung, Yu Sasaki
PublisherSpringer Science and Business Media Deutschland GmbH
Pages237-266
Number of pages30
ISBN (Print)9789819609406
DOIs
StatePublished - 2025
Event30th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024 - Kolkata, India
Duration: 9 Dec 202413 Dec 2024

Publication series

NameLecture Notes in Computer Science
Volume15490 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference30th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024
Country/TerritoryIndia
CityKolkata
Period9/12/2413/12/24

Keywords

  • SHA-256
  • SHA-512
  • meet-in-the-middle technique
  • practical collisions

Fingerprint

Dive into the research topics of 'The First Practical Collision for 31-Step SHA-256'. Together they form a unique fingerprint.

Cite this