The first collision for full SHA-1

M Stevens, E Bursztein, P Karpman, A Albertini… - Advances in Cryptology …, 2017 - Springer
… In this paper, we demonstrate that SHA-1 collision attacks have finally become practical
by providing the first known instance of a collision. Furthermore, the prefix of the colliding

Freestart collision for full SHA-1

M Stevens, P Karpman, T Peyrin - … on the Theory and Applications of …, 2016 - Springer
… In this article, we give the first colliding pair for the full SHA-1 compression function (see
Table 1), which amounts to a freestart collision for the full hash function. This was obtained at a …

Freestart collision for full SHA-1

M Stevens, P Karpman, T Peyrin - Cryptology ePrint Archive, 2015 - eprint.iacr.org
… This article presents an explicit freestart colliding pair for SHA-1first colliding pair for the full
SHA-1 compression function (see Table 1-1), which amounts to a freestart collision for the full

From collisions to chosen-prefix collisions application to full SHA-1

G Leurent, T Peyrin - Annual International Conference on the Theory and …, 2019 - Springer
Full size table … chosen-prefix collision for SHA-1 is not much more than a simple collision
search. Moreover our work has a strong impact in practice as chosen-prefix collision attacks are …

Finding SHA-1 characteristics: General results and applications

C De Canniere, C Rechberger - … Conference on the Theory and Application …, 2006 - Springer
… the performance of collision search attacks. In the case of SHA-1, finding such characteristics
made differential collision search attacks on the full SHA-1 possible in the first place. To …

Collisions of SHA-0 and Reduced SHA-1

E Biham, R Chen, A Joux, P Carribault… - Advances in Cryptology …, 2005 - Springer
… All the collisions of reduced SHA-1 that we present were found within a few seconds of …
attacking various reduced versions of SHA-1 with more rounds, and shows that SHA-1 up to 53–…

New collision attacks on SHA-1 based on optimal joint local-collision analysis

M Stevens - Advances in Cryptology–EUROCRYPT 2013: 32nd …, 2013 - Springer
… this nearcollision attack can be used to construct a SHA-1 identical-prefix collision attack …
Furthermore, we present the first SHA-1 chosen-prefix collision attack with a complexity of 277.1 …

{SHA-1} is a shambles: First {Chosen-Prefix} collision on {SHA-1} and application to the {PGP} web of trust

G Leurent, T Peyrin - … USENIX Security Symposium (USENIX Security 20 …, 2020 - usenix.org
… Figure 3: Skeleton of starting differential path for all blocks during the near-collision phase
of our CP collision attack on SHA-1 (only the first 20 steps are depicted). The MSB’s are on the …

Collisions for 70-step SHA-1: on the full cost of collision search

C De Canniere, F Mendel, C Rechberger - Selected Areas in …, 2007 - Springer
SHA-1, and give complexity estimates and performance measurements of this new and
improved collision … methods, the first collision for SHA (the predecessor of SHA-1) was built using …

Practical Free-Start Collision Attacks on 76-step SHA-1

P Karpman, T Peyrin, M Stevens - Annual Cryptology Conference, 2015 - Springer
… found the collision that has reached the highest number of SHA-1 … a reminder that cryptanalysis
on SHA-1 continues to improve … 2 we first describe the SHA-1 hash function. In Sect. 3 we …