[18035] in cryptography@c2.net mail archive
AW: Possibly new result on truncating hashes
daemon@ATHENA.MIT.EDU (Kuehn, Ulrich)
Tue Aug  2 10:06:46 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Kuehn, Ulrich" <Ulrich.Kuehn@telekom.de>
To: kelsey.j@ix.netcom.com, cryptography@metzdowd.com
Date: Tue, 2 Aug 2005 08:40:24 +0200 
 
John Kelsey wrote:
> Unfortunately, we can't make this argument, because this 
> postulated collision algorithm can't be used to find a 
> collision in the whole SHA256 more efficiently than brute force.
> 
> Let's do the counting argument:  Each time we call the 
> 160-bit collision algorithm, we get a new pair which has the 
> same first 160 bits of SHA256 output, and random unrelated 
> last 96 bits of SHA256 output.  Each pair has a probability 
> of 2^{-96} of colliding in the remaining bits.  So, to get a 
> collision on the whole SHA256 using this 160-bit collision 
> algorithm, we expect to have to try about 2^{96} collision 
> pairs, each found at a cost of 2^{64}.  The resulting work is 
> 2^{64} * 2^{96} = 2^{160}, more than a straight brute-force 
> collision search on SHA256.  
> 
Hmm, wouldn't you expect a lot of partial collisions among all those 2^96 collision pairs? That is, after
2^80 runs of the algorithm you would obtain your first partial collision in collision pairs, don't you?
For 2^96 that's roughly 2^32 such pairs of pairs. Those might help you to speed up your search.
Am I missing something here?
Ulrich
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com